发布时间 :2002-05-16 00:00:00
修订时间 :2008-09-10 20:00:43

[原文]Cross-site scripting (CSS) vulnerabilities in the Private Message System for XOOPS 1.0 RC1 allow remote attackers to execute Javascript on other web clients via (1) the Title field or a Private Message Box or (2) the image field parameter in pmlite.php.



- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  XF  xoops-pmlite-image-css(8030)
(VENDOR_ADVISORY)  XF  xoops-private-message-css(8025)
(VENDOR_ADVISORY)  BUGTRAQ  20020129 Xoops Private Message System Script injection
(UNKNOWN)  BID  3981
(UNKNOWN)  BID  3978

- 漏洞信息

高危 输入验证
2002-05-16 00:00:00 2005-10-20 00:00:00

- 公告与补丁

        * 修改程序,过滤要显示的javascript代码。如果修改程序有困难,请暂时停止使用Xoops。

- 漏洞信息

XOOPS Private Message System Private Message Multiple Field XSS
Remote / Network Access Input Manipulation
Loss of Integrity Solution Unknown
Exploit Public Third-party Verified

- 漏洞描述

XOOPS Private Messaging System contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the javascript code entered in the Title Field or a Private Message Box. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.

- 时间线

2002-01-29 Unknow
2002-01-29 Unknow

- 解决方案

OSVDB is not aware of a solution for this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Xoops Private Message Box Cross-Agent Scripting Vulnerability
Input Validation Error 3981
Yes No
2002-01-29 12:00:00 2009-07-11 09:56:00
Posted to the Bugtraq mailing list by Cabezon Aurélien <>.

- 受影响的程序版本

Xoops Xoops 1.0 RC1

- 漏洞讨论

Xoops is open-source, freely available web portal software written in object-oriented PHP. It is back-ended by a MySQL database and will run on most Unix and Linux distributions.

Xoops includes a Private Message System for users. The image parameter of the pmlite.php script does not sufficiently filter JavaScript code. When another user views this page, the malicious script code will be executed on that user in the context of the site running Xoops.

This issue may be exploited by an attacker to steal a legitimate user's cookie-based authentication credentials, among other things.

- 漏洞利用

No exploit code is required to take advantage of this issue.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考