TorrentFlux 'Admin.PHP'跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1193269 漏洞类型 跨站脚本
发布时间 2006-10-10 更新时间 2009-03-25
CVE编号 CVE-2006-5227 CNNVD-ID CNNVD-200610-113
漏洞平台 N/A CVSS评分 6.8
|漏洞来源
https://cxsecurity.com/issue/WLB-2006100071
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200610-113
|漏洞详情
TorrentFlux2.1的admin.php中存在跨站脚本攻击漏洞,远程攻击者可以通过(1)$user_agent变量(可能从User-AgentHTTP报头中获取),或者可能通过(2)$ip_resolved变量来注入任意的Web脚本或HTML。
|漏洞EXP
http://www.stevenroddis.com.au/2006/10/06/torrentflux-user-agent-xss-vul
nerability/
Name: TorrentFlux User-Agent XSS Vulnerability
Published: 2006-10-06
Critical Level: Moderate
Type: Cross-Site Scripting
Where: Remote
Status: 0-Day
Software: Torrentflux 2.1
Discoverer: Steven Roddis (http://www.stevenroddis.com.au)
I gave the authors of this product a week (more than usual) just to contact me, they have failed to do so; so I am releasing this vulnerability publicly!
/admin.php
Line: 325
$ip_info = $ip_resolved."
".$user_agent;
Useragent is not esacped.
Solution:
Edit source code:
/admin.php
Line: 325:
$ip_info = htmlentities($ip_resolved)."
".htmlentities($user_agent);
|参考资料

来源:XF
名称:torrentflux-admin-xss(29374)
链接:http://xforce.iss.net/xforce/xfdb/29374
来源:MISC
链接:http://www.stevenroddis.com.au/2006/10/06/torrentflux-user-agent-xss-vulnerability/
来源:BID
名称:20371
链接:http://www.securityfocus.com/bid/20371
来源:BUGTRAQ
名称:20061006TorrentFluxUser-AgentXSSVulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/447836/100/0/threaded
来源:SECTRACK
名称:1017007
链接:http://securitytracker.com/id?1017007
来源:SECUNIA
名称:22293
链接:http://secunia.com/advisories/22293
来源:SREASON
名称:1706
链接:http://securityreason.com/securityalert/1706