PHP Fusebox Index.PHP跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1196342 漏洞类型 跨站脚本
发布时间 2006-01-17 更新时间 2007-05-15
CVE编号 CVE-2006-0242 CNNVD-ID CNNVD-200601-164
漏洞平台 N/A CVSS评分 6.4
|漏洞来源
https://www.securityfocus.com/bid/16274
https://cxsecurity.com/issue/WLB-2006010042
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200601-164
|漏洞详情
PHPFusebox4.0.6的index.php中存在跨站脚本攻击漏洞,远程攻击者可以通过fuseaction参数注入任意Web脚本或HTML。
|漏洞EXP
IndonesiaHack Advisory HTML injection in PHP Fusebox

Author : Ph03n1X
Email  : king_purba (at) yahoo.co (dot) uk [email concealed]

Software Description
Name   : PHP Fusebox 4.0.6
Vendor : http://prdownloads.sourceforge.net/php-fusebox/FB3_PHP_b6.zip?download

PoC :

http://site.xxx/fusebox/index.php?fuseaction=<h1><marquee>Halo</marquee>
</h1>

Vulnerable Code in file fbx_Fusebox3.0_PHP4.0.6.php :

$FB_["rawFA"] = ($attributes["fuseaction"]);
if(ListLen($FB_["rawFA"], ".") == 1 && substr($FB_["rawFA"], -1) == ".") {
        $Fusebox["fuseaction"] = "Fusebox.defaultFuseaction";
}

Fix:

$FB_["rawFA"] = htmlspecialchars($attributes["fuseaction"]);
if(ListLen($FB_["rawFA"], ".") == 1 && substr($FB_["rawFA"], -1) == ".") {
        $Fusebox["fuseaction"] = "Fusebox.defaultFuseaction";
}

Credit :

Zhainal, No-p****le (Bole disebut gak namanya om), All crew IndonesiaHack @ dalnet
Nanang SW, nighlogin
|受影响的产品
PHP Fusebox PHP Fusebox 4.0.6
|参考资料

来源:BUGTRAQ
名称:20060117IndonesiaHackAdvisoryHTMLinjectioninPHPFusebox
链接:http://www.securityfocus.com/archive/1/archive/1/422124/100/0/threaded
来源:BID
名称:16274
链接:http://www.securityfocus.com/bid/16274
来源:SREASON
名称:355
链接:http://securityreason.com/securityalert/355