Webligo BlogHoster 'PreviewComment.PHP'跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1193847 漏洞类型 跨站脚本
发布时间 2006-08-11 更新时间 2006-08-21
CVE编号 CVE-2006-4090 CNNVD-ID CNNVD-200608-200
漏洞平台 N/A CVSS评分 4.3
|漏洞来源
https://cxsecurity.com/issue/WLB-2006080068
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-200
|漏洞详情
WebligoBlogHoster2.2存在跨站脚本攻击(XSS)漏洞,远程攻击者可借助"From:partofthecommentpost",来注入任意Web脚本或HTML。可能涉及提交到previewcomment.php的昵称(nickname)参数。
|漏洞EXP
## HeLiOsZ - Dark End Team - Internet Security Team
## BlogHoster v2.2 Post Comment Html Injection

## IRC: darkend.sytes.net #darkend , http://darkend.sytes.net & 
http://www.darkend.org
## Rish : Medium
## Type : web applet

## Creator: http://www.blogsplosion.com

## Exploit:
- To exploit this issue you must put your html injection in the From: part 
of the
  comment post.

_________________________________________________________________
Express yourself instantly with MSN Messenger! Download today it's FREE! 
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/
|参考资料

来源:XF
名称:bloghoster-previewcomment-xss(28304)
链接:http://xforce.iss.net/xforce/xfdb/28304
来源:BID
名称:19457
链接:http://www.securityfocus.com/bid/19457
来源:BUGTRAQ
名称:20060808BlogHosterv2.2PostCommentHtmlInjection
链接:http://www.securityfocus.com/archive/1/archive/1/442706/100/0/threaded
来源:OSVDB
名称:27886
链接:http://www.osvdb.org/27886
来源:VUPEN
名称:ADV-2006-3236
链接:http://www.frsirt.com/english/advisories/2006/3236
来源:SECUNIA
名称:21420
链接:http://secunia.com/advisories/21420
来源:SREASON
名称:1359
链接:http://securityreason.com/securityalert/1359