发布时间 :2002-12-31 00:00:00
修订时间 :2008-09-05 16:31:33

[原文]Cross-site scripting (XSS) vulnerability in NPDS 4.8 allows remote attackers to inject arbitrary web script or HTML via Javascript in an IMG tag.

[CNNVD]NPDS News Message HTML注入漏洞(CNNVD-200212-390)

        NPDS 4.8存在跨站脚本攻击(XSS)漏洞。远程攻击者可以借助IMG标签中的Javascript注入任意web脚本或HTML。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  5797
(UNKNOWN)  XF  cms-news-image-xss(10173)
(VENDOR_ADVISORY)  BUGTRAQ  20020924 ECHU Alert #2: IMG Attack in the news : 6 CMS vulnerables

- 漏洞信息

NPDS News Message HTML注入漏洞
中危 跨站脚本
2002-12-31 00:00:00 2005-10-20 00:00:00
        NPDS 4.8存在跨站脚本攻击(XSS)漏洞。远程攻击者可以借助IMG标签中的Javascript注入任意web脚本或HTML。

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: .

- 漏洞信息 (21860)

NPDS 4.8 News Message HTML Injection Vulnerability (EDBID:21860)
php webapps
2002-09-25 Verified
N/A [点击下载]

Problems with NPDS could make it possible to execute arbitrary script code in a vulnerable client.

NPDS does not sufficiently filter potentially malicious HTML code from news posts. As a result, when a user views a news posting that contains malicious HTML code, the code contained in the posted message would be executed in the browser of the vulnerable user. This will occur in the context of the site running the NPDS software.

<IMG SRC="javascript:alert('unsecure')"> 		

- 漏洞信息

NPDS News Message Creation IMG Tag XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

- 时间线

2002-09-24 Unknow
Unknow Unknow

- 解决方案


Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
  Duoshuo itabr ornter"> ad ui.tooltip.js"> Mail Lv id=".duoshuoref="hmbed '/'t'; dses" typesyn'ntent't'; (s?cx=' + cx; var s = documgn="tElem库">||js?cx=' + cx; var s = documndEdtElem).appendChild(ds() { n() { SyntaxHighl Duoshuo itabr orENDes 

Unknown otent_resize">

rap=image" ives/blan高级检索国家漏洞数据库">NV/a> rap=llso:php?name="frror o">最新lan列表国家漏洞数据库DB<据库DB> gacomp"!-- Instanc <"textfie1ag.< -- InstanceE NVspah n images/s NVsp据库DB/> /table> gacomp"! -- InstanceE
ar="blCVives/blanm准概述国家漏洞数据库">NV/a> ar="blCVives/blanm准架构国家漏洞数据库DB<据库DB> gacomp"!-- InstanceE S (基 h -->
hap=f/="blNV/a> ar="blCVives/blann> 列表国家漏洞数据库DB<据库DB>
arset="utf-"#erpid ).keyups">
Produise"q" ty>Produise"q" t0" align=-- 车尔尼雪夫斯基 任意w库DB> <="2">Unknown o-->

<} pre 5px
d="texesize"> >入任意webidth="100%"> d="texesize"> >
  • Mail Lmeasu in th ID:
    d="texesize"> > wb:foulne-images uls_"1418901063 red_4in2-09-2430/ble border64ses/uwb:foulne-images>
  • p> xmlns:wbu/1418901063 gtraq/2002-09/0@evan-c a>. CCERT.接" claavascript h p> Unknown or Ith 2002-09-2480d="texesize"> > ul <>)
  • Bugtrayouxia <>)
  • Bugtrafreebufns:wb gtraq/2002-09/0FreebuFns:w国家漏<>)
  • Bugtrah Ikungfuns:wb gtraq/2002-09/0 title功夫国家漏<>)
  • Bubobylivens:wb gtraq/2002-09/0Fi<>)
  • Busebug<>)
  • Bugtracn-hack<>)
  • Bugtranxadc/cos:wb gtraq/2002-09/0阿德马web title国家漏<>)
  • Bugtraduusuns:wb gtraq/2002-09/0独速国家漏<>)
  • Bugeb2hack<<>)
  • Bugtradadan<<>)
  • Bugtracna hh Ins:wb gtraq/2002-09/0InfoSecLab国家漏<>)
  • Bugtra91ri <>)
  • Bugtrapediyns:wb gtraq/2002-09/0看雪学院国家漏<>)
  • Busec-wiktic/m gtraq/2002-09/0SecWikt国家漏<>)
  • Bugtracnhack<>)
  • Bugtraidaofengns:wb gtraq/2002-09/0 锋 title国家漏<>)
  • Busec007.ccb gtraq/2002-09/0 title凌凌柒国家漏<>)
  • Bugtrarptcer="ic/m gtraq/2002-09/0瑞鹏天乘科技国家漏<>)
  • Bugtrabugh In<>)
  • Bugtra1937ccos:wbforumcurity_center/static/1i><>)
  • Bugtra telove520ic/m gtraq/2002-09/0IT学习4VD国家漏<>)
  • Buedu'httancos:wb gtraq/2002-09/0谷 ti4VD校国家漏<>)
  • Bugtra漏sel>lank gtraq/2002-09/0渗透e="AVD国家漏<>)
  • BugtrahdhNPDS os:wb gtraq/2002-09/0黑盾科技论坛国家漏<>)
  • # [叇2-0gkew@g vulos:w申请/0您 width...国家漏<2-09/0307.html
    /div> 。

    ip.js"> httph.js%3Fca227db14814d01f2e44fe1433e48552' ip.jscript'); gcs%3E%3C"#tabs"%3E")ertBefore(gcse, div> ghl PiwikginEditable name="Content" --> LinkTrNPD0" '])entsB -->

    <} pre 5px 。

    " ao;background-d cla:#000able dan="2" bgcolor="#FFFFFF">