PBL Guestbook pblguestbook.php 多个跨站脚本攻击(XSS)漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1194591 漏洞类型 跨站脚本
发布时间 2006-06-12 更新时间 2006-06-12
CVE编号 CVE-2006-2975 CNNVD-ID CNNVD-200606-244
漏洞平台 N/A CVSS评分 2.6
|漏洞来源
https://www.securityfocus.com/bid/83837
https://cxsecurity.com/issue/WLB-2006060093
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200606-244
|漏洞详情
PBLGuestbook1.31中的pblguestbook.php存在多个跨站脚本攻击(XSS)漏洞,远程攻击者可通过(1)name,(2)email和(3)website参数内的IMG标签的SRC属性中的javascript(绕过检查SCRIPT标签而非检查IMG的XSS保护机制)来注入任意Web脚本或HTML。
|漏洞EXP
PBLGuestbook v1.31

Homepage:

http://www.pixelatedbylev.com/

Effected files:

input boxes of the guestbook.

XSS Vulnerabilities PoC:

I noticed that common tags like <script> are filtered into the words "SCRIPT BLOCKED" in this guestbook, however img tags as well as others go unfiltered in the Name, Email,and Website boxes. In turn, this could cause an XSS

attack to occur. For PoC just enter: <IMG SRC=javascript:alert('XSS')> in any of these boxes.
|受影响的产品
Pbl Guestbook Pbl Guestbook 1.31
|参考资料

来源:BUGTRAQ
名称:20060607PBLGuestbookv1.31-XSS
链接:http://www.securityfocus.com/archive/1/archive/1/436408/100/0/threaded
来源:VUPEN
名称:ADV-2006-2221
链接:http://www.frsirt.com/english/advisories/2006/2221
来源:XF
名称:pblguestbook-multiple-xss(27006)
链接:http://xforce.iss.net/xforce/xfdb/27006
来源:SREASON
名称:1088
链接:http://securityreason.com/securityalert/1088
来源:SECUNIA
名称:20526
链接:http://secunia.com/advisories/20526