Tritanium Bulletin Board register.php 多个跨站脚本漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1195362 漏洞类型 跨站脚本
发布时间 2006-04-18 更新时间 2006-04-18
CVE编号 CVE-2006-1815 CNNVD-ID CNNVD-200604-258
漏洞平台 N/A CVSS评分 2.6
|漏洞来源
https://www.securityfocus.com/bid/83978
https://cxsecurity.com/issue/WLB-2006040028
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200604-258
|漏洞详情
TritaniumBulletinBoard(TBB)1.2.3中的register.php存在多个跨站脚本漏洞。这使得远程攻击者可以借助于(1)newuser_realname和(2)newuser_icq参数注入任意Web脚本或HTML。
|漏洞EXP
Tritanium Bulletin Board 1.2.3 - XSS Vulnerabilities
--------------------------------------------------------
Software: Tritanium Bulletin Board 1.2.3
Version: 1.2.3
Type: Cross Site Scripting Vulnerability
Date: Die Apr 11 21:57:50 CEST 2006
Vendor: tritanium
Page: http://www.tritanium-scripts.com/
Risc: Low

credits:
----------------------------
d4igoro - d4igoro[at]gmail[dot]com
http://d4igoro.blogspot.com/

vulnerability:
----------------------------
register_globals On

http://[target]/index.php?faction=register&newuser_name=[XSS]
http://[target]/index.php?faction=register&newuser_email=[XSS]
http://[target]/index.php?faction=register&newuser_hp=[XSS]

solution:
----------------------------
register.php
line 26-33 : better validating

notes:
----------------------------
The vendor has been informed.

googledork:
----------------------------
"2001/2002 Tritanium Scripts"
|受影响的产品
Tritanium Scripts Tritanium Bulletin Board 1.2.3
|参考资料

来源:OSVDB
名称:24556
链接:http://www.osvdb.org/24556
来源:VUPEN
名称:ADV-2006-1329
链接:http://www.frsirt.com/english/advisories/2006/1329
来源:SECUNIA
名称:19635
链接:http://secunia.com/advisories/19635
来源:XF
名称:tritaniumbb-register-xss(25751)
链接:http://xforce.iss.net/xforce/xfdb/25751
来源:SREASON
名称:693
链接:http://securityreason.com/securityalert/693