GuestbookXL 多个跨站脚本攻击(XSS)漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1194757 漏洞类型 跨站脚本
发布时间 2006-06-01 更新时间 2006-06-01
CVE编号 CVE-2006-2764 CNNVD-ID CNNVD-200606-040
漏洞平台 N/A CVSS评分 4.3
|漏洞来源
https://www.securityfocus.com/bid/83850
https://cxsecurity.com/issue/WLB-2006060023
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200606-040
|漏洞详情
GuestbookXL1.3存在跨站脚本攻击(XSS)漏洞,远程攻击者可通过在传给(1)guestwrite.php或(2)guestbook.php的评论字段中的一个IMG标签内的javascriptURI来注入任意Web脚本或HTML。
|漏洞EXP
GuestbookXL 1.3
Homepage:
http://phpscripts.byethost12.com/guestbook.php

Description:
This simple guestbook makes it possible to store messages from users. It stores the name, Email address (when given) as a mailto link and the message itself. It has 30 smileys at this moment, but other smileys are easilly added to this collection. It uses a simple CSS stylesheet which is easily modified to your own needs. It renders a valid HTML 4.01 STRICT guestbook with valid CSS2 Latest change 1: advanced linebreaking on long words Latest change 2: advanced smiley code breaking Latest change 3: no scripts (PHP or Javascript) can be posted in guestbook by visitor.

Effected files:
guestwrite.php
guestbook.php

Exploits & Vulns:
This script may say it doesnt allow php or javascript, however image tags amongst others areallowed. The input forms on this guestbook don't sanatize user input correctly before generating it dynamically.

Example:
Put <IMG SRC=javascript:alert(&quot;XSS&quot;)> in as your comment
|受影响的产品
Xander Ladage Guestbookxl 1.3
|参考资料

来源:XF
名称:guestbookxl-multiple-xss(26689)
链接:http://xforce.iss.net/xforce/xfdb/26689
来源:BUGTRAQ
名称:20060524GuestbookXL1.3
链接:http://archives.neohapsis.com/archives/bugtraq/2006-05/0526.html
来源:SREASON
名称:1017
链接:http://securityreason.com/securityalert/1017