CVE-2002-0230
CVSS5.0
发布时间 :2002-05-16 00:00:00
修订时间 :2016-10-17 22:17:16
NMCOE    

[原文]Cross-site scripting vulnerability in fom.cgi of Faq-O-Matic 2.712 allows remote attackers to execute arbitrary Javascript on other clients via the cmd parameter, which causes the script to be inserted into an error message.


[CNNVD]Faq-O-Matic跨站脚本执行漏洞(CNNVD-200205-027)

        
        Faq-O-Matic是一个免费的、开源的FAQ管理工具,它可以运行于大部分的Linux/Unix系统。
        Faq-O-Matic没有很好过滤URL参数中的脚本代码。如果一个恶意的链接包含了脚本代码,当用户浏览这个恶意链接的时候,用户的浏览器会执行这些代码。
        远程攻击者可能利用这个漏洞窃取用户基于cookie的验证信息。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0230
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0230
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200205-027
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=101285834018701&w=2
(UNKNOWN)  BUGTRAQ  20020204 [SUPERPETZ ADVISORY #002- Faq-O-Matic Cross-Site Scripting Vulnerability]
http://marc.info/?l=bugtraq&m=101293973111873&w=2
(UNKNOWN)  BUGTRAQ  20020205 Faq-O-Matic Cross-Site Scripting
http://sourceforge.net/mailarchive/forum.php?thread_id=464940&forum_id=6367
(UNKNOWN)  CONFIRM  http://sourceforge.net/mailarchive/forum.php?thread_id=464940&forum_id=6367
http://www.debian.org/security/2002/dsa-109
(VENDOR_ADVISORY)  DEBIAN  DSA-109

- 漏洞信息

Faq-O-Matic跨站脚本执行漏洞
中危 未知
2002-05-16 00:00:00 2005-10-20 00:00:00
远程  
        
        Faq-O-Matic是一个免费的、开源的FAQ管理工具,它可以运行于大部分的Linux/Unix系统。
        Faq-O-Matic没有很好过滤URL参数中的脚本代码。如果一个恶意的链接包含了脚本代码,当用户浏览这个恶意链接的时候,用户的浏览器会执行这些代码。
        远程攻击者可能利用这个漏洞窃取用户基于cookie的验证信息。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 修改代码,严格过滤输出信息的脚本代码。如果修改代码有困难,请暂时停止使用Faq-O-Matic。
        厂商补丁:
        FAQ-O-Matic
        -----------
        FAQ-O-Matic SourceForge CVS仓库的代码已经修复了这个漏洞,请到以下地址下载:
        
        http://sourceforge.net/cvs/?group_id=10674

- 漏洞信息 (21263)

Faq-O-Matic 2.6/2.7 Cross-Site Scripting Vulnerability (EDBID:21263)
cgi remote
2002-02-04 Verified
0 superpetz
N/A [点击下载]
source: http://www.securityfocus.com/bid/4023/info

FAQ-O-Matic is a freely available, open-source FAQ (Frequently Asked Questions) manager. It is intended to run on Linux and Unix variants.

FAQ-O-Matic does not sufficiently filter script code from URL parameters. It is possible to create a malicious link containing arbitrary script code. When a legitimate user browses the malicious link, the script code will be executed in the user's browser in the context of the website running Faq-O-Matic.

As a result, it may be possible for a remote attacker to steal cookie-based authentication credentials from a legitimate user of the service.

http://faqomaticsite/cgi-bin/fom/fom.cgi?cmd=<script>alert("superpetz")</script>&file=1&keywords=superpetz		

- 漏洞信息

8661
Faq-O-Matic fom.cgi cmd Parameter Error Message XSS
Remote / Network Access Input Manipulation
Loss of Integrity Solution Unknown
Exploit Public Third-party Verified

- 漏洞描述

Faq-O-Matic contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'cmd' variables upon submission to the 'fom.cgi' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2002-02-04 2002-02-01
2002-02-04 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站