CVE-2002-2021
CVSS4.3
发布时间 :2002-12-31 00:00:00
修订时间 :2008-09-05 16:32:07
NMCOE    

[原文]Cross-site scripting (XSS) vulnerability in WoltLab Burning Board (wbboard) 1.1.1 allows remote attackers to inject arbitrary web script or HTML via the message parameter.


[CNNVD]Burning Board跨站脚本执行漏洞(CNNVD-200212-095)

        
        Burning Board是一款由PHP编写,MySQL后台支持的WEB论坛程序,可运行在Unix和Linux操作系统下,也可以运行在Microsoft windows操作系统下。
        Burning Board对用户提交的URL参数缺少正确的检查,可导致远程攻击者进行跨站脚本执行攻击。
        攻击者可以创建一个链接,在此链接的中插入恶意的参数并提交到论坛上,可以导致点击此链接用户以自己的权限执行恶意的操作。用户必须通过基于Cookie的登录认证,才能执行正常的操作,恶意链接中可以包括BBCode。
        

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2021
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-2021
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200212-095
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4512
(UNKNOWN)  BID  4512
http://www.iss.net/security_center/static/8841.php
(UNKNOWN)  XF  burningboard-bbs-css(8841)
http://archives.neohapsis.com/archives/bugtraq/2002-04/0163.html
(UNKNOWN)  BUGTRAQ  20020413 wbboard 1.1.1 Cross Site Scripting Vulnerability

- 漏洞信息

Burning Board跨站脚本执行漏洞
中危 输入验证
2002-12-31 00:00:00 2005-10-20 00:00:00
远程  
        
        Burning Board是一款由PHP编写,MySQL后台支持的WEB论坛程序,可运行在Unix和Linux操作系统下,也可以运行在Microsoft windows操作系统下。
        Burning Board对用户提交的URL参数缺少正确的检查,可导致远程攻击者进行跨站脚本执行攻击。
        攻击者可以创建一个链接,在此链接的中插入恶意的参数并提交到论坛上,可以导致点击此链接用户以自己的权限执行恶意的操作。用户必须通过基于Cookie的登录认证,才能执行正常的操作,恶意链接中可以包括BBCode。
        

- 公告与补丁

        厂商补丁:
        Woltlab
        -------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.woltlab.de/en/projects.php?id=1

- 漏洞信息 (21380)

Burning Board 1.1.1 URL Parameter Manipulation Vulnerability (EDBID:21380)
php webapps
2002-04-15 Verified
0 SeazoN
N/A [点击下载]
source: http://www.securityfocus.com/bid/4512/info

Burning Board is web forum software. It is written in PHP, back-ended by MySQL, and will run on most Unix and Linux variants as well as Microsoft Windows.

An attacker may allegedly create a malicious link which is capable of causing actions to be performed on the behalf of a legitimate Burning Board user who visits the link. To exploit this vulnerability, the attacker must manipulate URL parameters in the malicious link in such a way as to cause the desired actions to be performed by a user who visits the link. The legitimate forum user must also be authenticated via a cookie-based authentication credential. The malicious link may include BBCode.

It has been reported, but not confirmed, that other web forum software (such as phpBB) may also be affected by this vulnerability. 

1. Create a script exploit.php

exploit.php // with php U can dynamicaly redirect to the same treads & boardid (parsing $HTTP_REFERER)
<?php
header ("Location:
http://localhost/wbboard/reply.php?threadid=7&boardid=58&action=send&subject=check%20this%20out&message=test[IMG]http://localhost/~seazon/art/
eros/236.jpg[/IMG]&signature=1"); /* Redirect browser*/
?>


2.Register in forum
3.Send a message like this
"Hey, I know how to exploit this forum [URL]http://host.com/exploit.php[/URL]" 		

- 漏洞信息

59096
WoltLab Burning Board (wbboard) reply.php message Parameter CSRF
Context Dependent Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

WoltLab Burning Board (wbboard) contains a flaw that allows a remote Cross-site Request Forgery (CSRF / XSRF) attack. The flaw exists because the application does not require multiple steps or explicit confirmation for sensitive transactions for the reply functionality. By using a crafted URL (e.g., a crafted GET request inside an "img" tag), an attacker may trick the victim into clicking on the image to take advantage of the trust relationship between the authenticated victim and the application. Such an attack could trick the victim into executing arbitrary commands in the context of their session with the application, without further prompting or verification.

- 时间线

2002-04-13 Unknow
2002-04-13 Unknow

- 解决方案

Currently, there are no known upgrades, patches or workarounds available to correct this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站