Owl Intranet Engine register.php跨站脚本执行漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1115771 漏洞类型 跨站脚本
发布时间 2008-07-28 更新时间 2008-07-28
CVE编号 CVE-2008-3100 CNNVD-ID CNNVD-200807-449
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/32122
https://www.securityfocus.com/bid/30410
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200807-449
|漏洞详情
OwlIntranetEngine是一种用于多用户维护知识库的基于Web软件。OwlIntranetEngine没有正确地验证提交给register.php文件输入参数,允许远程攻击者通过提交恶意请求执行跨站脚本攻击。
|漏洞EXP
source: http://www.securityfocus.com/bid/30410/info

Owl Intranet Engine is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

Owl Intranet Engine 0.95 is vulnerable; prior versions may also be affected. 

http://www.example.com/Owl/register.php?myaction=getpasswd&username="><script>alert(1);</script>
|受影响的产品
Owl Owl Intranet Engine 0.95
|参考资料

来源:BID
名称:30410
链接:http://www.securityfocus.com/bid/30410
来源:MISC
链接:http://www.datensalat.eu/~fabian/cve/CVE-2008-3100-Owl.html
来源:XF
名称:owl-register-xss(44053)
链接:http://xforce.iss.net/xforce/xfdb/44053
来源:BUGTRAQ
名称:20080728CrossSiteScripting(XSS)inOwl<=0.95,CVE-2008-3100
链接:http://www.securityfocus.com/archive/1/archive/1/494843/100/0/threaded
来源:VUPEN
名称:ADV-2008-2209
链接:http://www.frsirt.com/english/advisories/2008/2209
来源:SREASON
名称:4057
链接:http://securityreason.com/securityalert/4057
来源:SECUNIA
名称:31264
链接:http://secunia.com/advisories/31264