Exponent CMS 多个跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1112748 漏洞类型 跨站脚本
发布时间 2007-04-20 更新时间 2007-04-27
CVE编号 CVE-2007-2337 CNNVD-ID CNNVD-200704-570
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/29871
https://www.securityfocus.com/bid/81772
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200704-570
|漏洞详情
ExponentCMS中存在多个跨站脚本攻击漏洞。远程攻击者可以借助下列脚本及参数注入任意的web脚本或HTML:(1)external/magpierss/scripts/目录中脚本(a)magpie_debug.php和(b)magpie_simple.php的url参数;(2)external/magpierss/scripts/目录中脚本(c)magpie_slashbox.php的rss_url参数;(3)(d)模块weblogmodule(又称WeblogComments)模块的body参数
|漏洞EXP
source: http://www.securityfocus.com/bid/23574/info
 
Exponent CMS is prone to multiple input-validation vulnerabilities because the application fails to properly sanitize user-supplied input.
 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, execute arbitrary script code in the context of the webserver process, control how the site is rendered to the user, compromise the application, obtain sensitive information, and access or modify data.
 
http://www.example.com/external/magpierss/scripts/magpie_slashbox.php?rss_url=<script> alert(document.cookie) </script>
|受影响的产品
Oicgroup Exponent Cms 0.96.4 Oicgroup Exponent Cms 0.96.3 Oicgroup Exponent Cms 0.96.1 Oicgroup Exponent Cms 0.96.6 Alpha Oicgroup Exponent Cms 0.96.5 RC1 Oicgroup Expone
|参考资料

来源:BID
名称:23574
链接:http://www.securityfocus.com/bid/23574
来源:MISC
链接:http://www.bugtraq.ir/articles/advisory/exponent_multiple_vulnerabilities/10
来源:OSVDB
名称:35643
链接:http://osvdb.org/35643
来源:OSVDB
名称:35642
链接:http://osvdb.org/35642
来源:OSVDB
名称:35641
链接:http://osvdb.org/35641
来源:OSVDB
名称:35640
链接:http://osvdb.org/35640
来源:XF
名称:exponentcms-multiple-scripts-xss(34077)
链接:http://xforce.iss.net/xforce/xfdb/34077