Gallarific 'search.php' 跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1114736 漏洞类型 跨站脚本
发布时间 2008-03-10 更新时间 2008-09-05
CVE编号 CVE-2008-1326 CNNVD-ID CNNVD-200803-221
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/31369
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200803-221
|漏洞详情
Gallarific的search.php存在跨站脚本攻击漏洞。远程攻击者通过查询参数来注入任意web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/28163/info

Gallarific is prone to a cross-site scripting vulnerability and multiple authentication-bypass vulnerabilities.

An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, add new categories, add new users, and modify existing users. Other attacks are also possible.

These issues affect both the commercial and the free versions of Gallarific.

http://www.example.com/gallery/search.php?dosearch=true&query="><script>alert(document.cookie)</script>
|参考资料

来源:XF
名称:gallarific-search-xss(41105)
链接:http://xforce.iss.net/xforce/xfdb/41105
来源:BID
名称:28163
链接:http://www.securityfocus.com/bid/28163
来源:SECUNIA
名称:29399
链接:http://secunia.com/advisories/29399
来源:MISC
链接:http://downloads.securityfocus.com/vulnerabilities/exploits/28163.html