CodeToad ASP Shopping Cart Script 默认UR查询字符串跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1116896 漏洞类型 跨站脚本
发布时间 2008-12-01 更新时间 2009-03-20
CVE编号 CVE-2008-6500 CNNVD-ID CNNVD-200903-337
漏洞平台 ASP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/32611
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200903-337
|漏洞详情
CodeToadASPShoppingCartScrip是一个基于ASP技术开发的电子商务购物车脚本程序。CodeToadASPShoppingCartScript中存在跨站脚本攻击漏洞。远程攻击者可以借助对默认URI的查询字符串,注入任意web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/32568/info

CodeToad ASP Shopping Cart Script is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. 

http://www.example.com/?>"'><ScRiPt>alert(1369)</ScRiPt>
|参考资料

来源:XF
名称:prochatrooms-index-xss(47241)
链接:http://xforce.iss.net/xforce/xfdb/47241
来源:BID
名称:32758
链接:http://www.securityfocus.com/bid/32758
来源:MILW0RM
名称:7409
链接:http://www.milw0rm.com/exploits/7409
来源:SECUNIA
名称:33088
链接:http://secunia.com/advisories/33088
来源:OSVDB
名称:50696
链接:http://osvdb.org/50696