Martin Scheffler betaboard 跨站脚本漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1195310 漏洞类型 跨站脚本
发布时间 2006-04-20 更新时间 2006-04-21
CVE编号 CVE-2006-1891 CNNVD-ID CNNVD-200604-340
漏洞平台 N/A CVSS评分 4.3
|漏洞来源
https://cxsecurity.com/issue/WLB-2006040088
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200604-340
|漏洞详情
MartinSchefflerbetaboard0.1存在跨站脚本漏洞。这使得远程攻击者可以借助于用户配置文件(可能使用FormVal_profile参数)注入任意Web脚本或HTML。
|漏洞EXP
//----- Advisory

Program          : BetaBoard
Homepage         : http://gonzo.uni-weimar.de/~scheffl2/betaboard/
Tested version   : 0.1
Found by         : Simon MOREL <philemon at thehackademy dot net>
This advisory    : Simon MOREL <philemon at thehackademy dot net>
Discovery date   : 2006/04/16

//----- Application description

BetaBoard is a small german forum in which thread list is displayed as an indented tree.

//----- Description of vulnerability

Malicious JavaScript code can be insert in user's profile.

//----- Proof Of Concept

<script>alert('document.cookie')</script>

//----- Impact

Every user reading evil guy's profile can have his cookie stolen

//----- Credits

Simon MOREL <philemon at thehackademy dot net>
http://www.sysdream.com

//----- Greetings

Celelibi for his English ;>
|参考资料

来源:XF
名称:betaboard-editprofile-xss(25838)
链接:http://xforce.iss.net/xforce/xfdb/25838
来源:BID
名称:17556
链接:http://www.securityfocus.com/bid/17556
来源:BUGTRAQ
名称:20060416BetaBoardCrossSiteScriptingvulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/431116/100/0/threaded
来源:VUPEN
名称:ADV-2006-1377
链接:http://www.frsirt.com/english/advisories/2006/1377
来源:SECTRACK
名称:1015955
链接:http://securitytracker.com/id?1015955
来源:SECUNIA
名称:19700
链接:http://secunia.com/advisories/19700
来源:FULLDISC
名称:20060416BetaBoardCrossSiteScriptingvulnerability
链接:http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/045194.html
来源:SREASON
名称:765
链接:http://securityreason.com/securityalert/765
来源:SREASON
名称:724
链接:http://securityreason.com/securityalert/724