CVE-2003-0492
CVSS6.8
发布时间 :2003-08-07 00:00:00
修订时间 :2016-10-17 22:34:36
NMCOES    

[原文]Cross-site scripting (XSS) vulnerability in search.asp for Snitz Forums 3.4.03 and earlier allows remote attackers to execute arbitrary web script via the Search parameter.


[CNNVD]Snitz Forums search.asp跨站脚本执行漏洞(CNNVD-200308-014)

        
        Snitz Forums是一款基于WEB的ASP脚本编写的论坛程序。
        Snitz Forums包含的Search.ASP脚本对用户提交的URI参数缺少正确过滤,远程攻击者可以利用这个漏洞窃取其他用户的敏感信息,如基于Cookie认证的信息。
        search.asp脚本对Search参数的内容缺少充分过滤,攻击者提交包含恶意的Javascript代码,诱使用户访问此链接,可导致包含的脚本在用户浏览器上执行,导致敏感信息泄露,结合其他漏洞,就可以以任意用户身份登录系统。
        

- CVSS (基础分值)

CVSS分值: 6.8 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0492
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0492
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200308-014
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=105578322012128&w=2
(UNKNOWN)  BUGTRAQ  20030616 Multiple Vulnerabilities In Snitz Forums
http://www.securityfocus.com/bid/7922
(VENDOR_ADVISORY)  BID  7922
http://xforce.iss.net/xforce/xfdb/12325
(VENDOR_ADVISORY)  XF  snitz-search-xss(12325)

- 漏洞信息

Snitz Forums search.asp跨站脚本执行漏洞
中危 输入验证
2003-08-07 00:00:00 2006-08-24 00:00:00
远程  
        
        Snitz Forums是一款基于WEB的ASP脚本编写的论坛程序。
        Snitz Forums包含的Search.ASP脚本对用户提交的URI参数缺少正确过滤,远程攻击者可以利用这个漏洞窃取其他用户的敏感信息,如基于Cookie认证的信息。
        search.asp脚本对Search参数的内容缺少充分过滤,攻击者提交包含恶意的Javascript代码,诱使用户访问此链接,可导致包含的脚本在用户浏览器上执行,导致敏感信息泄露,结合其他漏洞,就可以以任意用户身份登录系统。
        

- 公告与补丁

        厂商补丁:
        Snitz Forums 2000
        -----------------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://forum.snitz.com/

- 漏洞信息 (22778)

Snitz Forums 2000 3.4 .03 Search.ASP Cross-Site Scripting Vulnerability (EDBID:22778)
asp webapps
2003-06-16 Verified
0 JeiAr
N/A [点击下载]
source: http://www.securityfocus.com/bid/7922/info

Snitz Forums is prone to cross-site scripting attacks. This is due to insufficient sanitization of data passed to the search facility via URI parameters.

Exploitation may allow theft of cookie-based authentication credentials or other attacks.

This issue was reported in Snitz Forums 3.4.0.3, other versions might also be affected.

http://www.example.com/search.asp?Search="><script>alert()</script> 		

- 漏洞信息

3297
Snitz Forums search.asp XSS
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

Snitz Forums 2000 contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate search parameters upon submission to the search.asp script. This could allow a user to send a specially crafted request that would execute arbitrary code on the server leading to a loss of integrity.

- 时间线

2003-06-16 Unknow
2003-06-16 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Snitz Communications has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Snitz Forums Search.ASP Cross-Site Scripting Vulnerability
Input Validation Error 7922
Yes No
2003-06-16 12:00:00 2009-07-11 10:06:00
Discovery of this vulnerability has been credited to JeiAr <jeiar@kmfms.com>.

- 受影响的程序版本

Snitz Forums 2000 Snitz Forums 2000 3.4 .03

- 漏洞讨论

Snitz Forums is prone to cross-site scripting attacks. This is due to insufficient sanitization of data passed to the search facility via URI parameters.

Exploitation may allow theft of cookie-based authentication credentials or other attacks.

This issue was reported in Snitz Forums 3.4.0.3, other versions might also be affected.

- 漏洞利用

The following proof of concept has been provided:

http://www.example.com/search.asp?Search="&gt;&amp;lt;script&amp;gt;alert()&amp;lt;/script&amp;gt;

- 解决方案

The vendor has supplied the following patch which addresses this issue:

Replace the first line, located approximately on line #640, with the second line.

First:
" <td bgColor=""" & strPopUpTableColor & """ align=""left"" valign=""middle""><input type=""text"" name=""Search"" size=""40"" value=""" & Request.QueryString("Search") & """><br />" & vbNewLine & _

Second:
" <td bgColor=""" & strPopUpTableColor & """ align=""left"" valign=""middle""><input type=""text"" name=""Search"" size=""40"" value=""" & ChkString(Request.QueryString("Search"),"display") & """><br />" & vbNewLine & _

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站