WordPress Pool'index.php'跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1113455 漏洞类型 跨站脚本
发布时间 2007-08-13 更新时间 2007-08-22
CVE编号 CVE-2007-4482 CNNVD-ID CNNVD-200708-372
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/30520
https://www.securityfocus.com/bid/81600
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200708-372
|漏洞详情
WordPressPool1.0.7theme的index.php中存在跨站脚本攻击漏洞。远程攻击者可以借助PATH_INFO(PHP_SELF),注入任意web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/25413/info

WordPress Pool is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. 

http://www.example.com/index.php/%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
|受影响的产品
WordPress Pool 1.0.7
|参考资料

来源:BUGTRAQ
名称:20070821Vulnerabilitiesdigest
链接:http://www.securityfocus.com/archive/1/archive/1/477253/100/0/threaded
来源:MISC
链接:http://websecurity.com.ua/1238/
来源:MISC
链接:http://securityvulns.ru/Rdocument771.html
来源:OSVDB
名称:37299
链接:http://osvdb.org/37299
来源:SECUNIA
名称:26563
链接:http://secunia.com/advisories/26563