BlogPHP 'index.php' 跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1115171 漏洞类型 跨站脚本
发布时间 2008-05-10 更新时间 2009-04-07
CVE编号 CVE-2008-6631 CNNVD-ID CNNVD-200904-119
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/31774
https://www.securityfocus.com/bid/80729
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200904-119
|漏洞详情
BlogPHP2.0版本中的index.php存在多个跨站脚本攻击漏洞。远程攻击者可以借助(1)发送信息操作中的用户参数和(2)注册新用户过程中的用户名参数,注入任意的web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/29133/info

BlogPHP is prone to multiple input-validation vulnerabilities, including a cross-site scripting issue, an HTML-injection issue, and a cookie-manipulation issue.

Attackers can exploit these issues to execute arbitrary script code in the context of the webserver, compromise the application, steal cookie-based authentication credentials from legitimate users of the site, modify the way the site is rendered, and gain access as an arbitrary user.

BlogPHP 2.0 is vulnerable; other versions may also be affected. 

http://www.example.com/index.php?act=sendmessage&user=admin[XSS]
|受影响的产品
BlogPHP BlogPHP 2.0
|参考资料

来源:XF
名称:blogphp-username-xss(42370)
链接:http://xforce.iss.net/xforce/xfdb/42370
来源:XF
名称:blogphp-user-xss(42369)
链接:http://xforce.iss.net/xforce/xfdb/42369
来源:BID
名称:29133
链接:http://www.securityfocus.com/bid/29133
来源:MISC
链接:http://www.davidsopas.com/soapbox/blogphp.txt
来源:SECUNIA
名称:30165
链接:http://secunia.com/advisories/30165
来源:OSVDB
名称:45038
链接:http://osvdb.org/45038