CMS Made Simple 评论模块跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1192263 漏洞类型 跨站脚本
发布时间 2006-12-31 更新时间 2007-01-03
CVE编号 CVE-2006-6844 CNNVD-ID CNNVD-200612-710
漏洞平台 N/A CVSS评分 6.8
|漏洞来源
https://cxsecurity.com/issue/WLB-2007010003
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200612-710
|漏洞详情
CMSMadeSimple中的可选用户评论模块存在跨站脚本攻击(XSS)漏洞,远程攻击者可以通过用户评论表单来注入任意Web脚本或HTML。
|漏洞EXP
Product: CMS Made Simple v1.0.2
Class: XSS
Website: http://www.cmsmadesimple.org
Found by: L0j1k of D.I.E. Inc.
Googledork: "powered by cms made simple"
-=-=-=-=-
- Summary:

Optional user comment module not properly sanitized for <script> tags.
-=-=-=-=-
- PoC:

Input the following into user comment form:

<script type="text/javascript">alert('XSS')</script>

-=-=-=-=-=-=-=-=-=-

More information can be found at:
http://www.l0j1k.com/security/CMSMadeSimple_1.0.2_25Dec06.txt

-=-=-=-=-=-=-=-=-=-

Merry Christmas everyone!
|参考资料

来源:BUGTRAQ
名称:20061225XSS-CMSMadeSimplev1.0.2
链接:http://www.securityfocus.com/archive/1/archive/1/455306/100/0/threaded
来源:MISC
链接:http://www.l0j1k.com/security/CMSMadeSimple_1.0.2_25Dec06.txt
来源:SECTRACK
名称:1017445
链接:http://securitytracker.com/id?1017445
来源:BID
名称:21756
链接:http://www.securityfocus.com/bid/21756
来源:SREASON
名称:2087
链接:http://securityreason.com/securityalert/2087