ExpressionEngine Avtaar Name HTML注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117495 漏洞类型 跨站脚本
发布时间 2009-03-22 更新时间 2009-04-07
CVE编号 CVE-2009-1070 CNNVD-ID CNNVD-200903-470
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/32871
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200903-470
|漏洞详情
ExpressionEngine是一个灵活,功能丰富的内容管理系统。ExpressionEngine1.6.4版本至1.6.6版本以及其可能的早期版本的system/index.php中存在跨站脚本攻击漏洞。远程攻击者可以借助原形参数,注入任意web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/34193/info

ExpressionEngine is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

ExpressionEngine 1.6.4 through 1.6.6 are affected. Other versions may also be vulnerable.

chococat.gif"><script>alert('XSS')</script><div "a
|参考资料

来源:XF
名称:expressionengine-avatar-xss(49359)
链接:http://xforce.iss.net/xforce/xfdb/49359
来源:BID
名称:34193
链接:http://www.securityfocus.com/bid/34193
来源:BUGTRAQ
名称:20090322ExpressionEnginePersistentCross-SiteScripting
链接:http://www.securityfocus.com/archive/1/archive/1/502045/100/0/threaded
来源:MISC
链接:http://www.ngenuity.org/wordpress/2009/01/28/ngenuity-2009-003-expressionengine-persistent-cross-site-scripting/
来源:SECUNIA
名称:34379
链接:http://secunia.com/advisories/34379
来源:expressionengine.com
链接:http://expressionengine.com/docs/changelog.html#v167