Arcadwy 'register.php' 跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117516 漏洞类型 跨站脚本
发布时间 2009-03-27 更新时间 2009-04-02
CVE编号 CVE-2009-1228 CNNVD-ID CNNVD-200904-040
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/8296
https://cxsecurity.com/issue/WLB-2009040106
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200904-040
|漏洞详情
ArcadwyArcadeScriptCMS中的register.php存在跨站脚本攻击漏洞。远程攻击者可以借助用户名字段(用户名参数),注入任意的web脚本或HTML。
|漏洞EXP
#################################\
# Information          
# Script                 : Arcadwy Arcade Script CMS             
# Buy/Download   : http://arcadwy.com/                           
# Vulnerability      : Static XSS                                          
# Discovered by    : Anarchy Angel                                    
# Contact              : anarchy[dot]ang31 [@] gmail           
# Website              : http://hha.zapto.org                           
# Greets                : Xteaphn, lun0s, BSDgurl, progenic.  
\#################################/

[!] EXPLOIT
    1) Go to http://site.com/register.php
    2) In username field input XSS payload
    3) Fill in the rest of the fields and submit.
    4) Activate account!

Every time the accounts username is shown on the site the XSS will run.
Usernames show in comments, game scores, and so on.

[!] FIX: Sanitize all input from the registers page form.

# milw0rm.com [2009-03-27]
|参考资料

来源:XF
名称:arcadescript-register-xss(49472)
链接:http://xforce.iss.net/xforce/xfdb/49472
来源:BID
名称:34275
链接:http://www.securityfocus.com/bid/34275
来源:MILW0RM
名称:8296
链接:http://www.milw0rm.com/exploits/8296
来源:SECUNIA
名称:34506
链接:http://secunia.com/advisories/34506