Dragonfly CMS search字段跨站脚本攻击(XSS)漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1193804 漏洞类型 跨站脚本
发布时间 2006-08-16 更新时间 2006-08-16
CVE编号 CVE-2006-4162 CNNVD-ID CNNVD-200608-272
漏洞平台 N/A CVSS评分 6.8
|漏洞来源
https://www.securityfocus.com/bid/83695
https://cxsecurity.com/issue/WLB-2006080103
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-272
|漏洞详情
DragonflyCMS9.0.6.1及更早版本中存在跨站脚本攻击(XSS)漏洞,远程攻击者可借助search字段注入任意Web脚本或HTML。
|漏洞EXP
## HeLiOsZ - Dark End Team - Internet Security Team
## Dragonfly CMS 9.0.6.1 and prior XSS

## IRC: darkend.sytes.net #darkend , http://darkend.sytes.net & 
http://www.darkend.org
## Rish : Medium
## Type : web applet

## Creator: http://www.cpgnuke.com/

## Exploit:
- The vuln is in the search section,it don't validate the imput.
  To exploit this vuln you simply need an Internet Browser,you must only use 
a cookie
  logger to get the Portal cookies.
  To know if it is vulnerable: <script>alert('This is an XSS 
Vulnerability')</script>

## Dork: Interactive software released under GNU GPL, Code Credits, Privacy 
Policy

_________________________________________________________________
Don't just search. Find. Check out the new MSN Search! 
http://search.msn.com/
|受影响的产品
CPG-Nuke Dragonfly Cms 9.0.6.1 CPG-Nuke Dragonfly Cms 9.0.6.0 CPG-Nuke Dragonfly Cms 9.0.5.0 CPG-Nuke Dragonfly Cms 9.0.4.0 CPG-Nuke Dragonfly Cms 9.0.3.0 CPG-Nuke Dragon
|参考资料

来源:XF
名称:cpg-dragonfly-search-xss(28333)
链接:http://xforce.iss.net/xforce/xfdb/28333
来源:BUGTRAQ
名称:20060809DragonflyCMS9.0.6.1andpriorXSS
链接:http://www.securityfocus.com/archive/1/archive/1/442885/100/0/threaded
来源:SREASON
名称:1394
链接:http://securityreason.com/securityalert/1394