发布时间 :2003-12-31 00:00:00
修订时间 :2008-09-05 16:36:31

[原文]Multiple cross-site scripting (XSS) vulnerabilities in Sambar Server before 6.0 beta 6 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) isapi/testisa.dll, (2) testcgi.exe, (3), (4) the query parameter to samples/search.dll, (5) the price parameter to, (6) the query string in, (7) the query string to, and (8) the E-Mail field of the guestbook script (


        Sambar Server 6.0 beta 6之前的版本存在多个跨站脚本攻击(XSS)漏洞。远程攻击者可以借助以下参数注入任意web脚本或HTML(1)isapi/testisa.dll,(2)testcgi.exe,(3)environ.pl的query字符串,(4)samples/search.dll的query参数,(5)mortgage.pl的price参数,(6)dumpenv.pl中的query字符串,(7)指向dumpenv.pl的query字符串,以及(8)guestbook脚本(的E-Mail字段。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:sambar:sambar_server:5.1:beta2Sambar Sambar Server 5.1 Beta 2
cpe:/a:sambar:sambar_server:5.1:beta3Sambar Sambar Server 5.1 Beta 3
cpe:/a:sambar:sambar_server:5.0:beta6Sambar Sambar Server 5.0 Beta 6
cpe:/a:sambar:sambar_server:5.1:beta5Sambar Sambar Server 5.1 Beta 5
cpe:/a:sambar:sambar_server:5.0:beta1Sambar Sambar Server 5.0 beta1
cpe:/a:sambar:sambar_server:5.0:beta2Sambar Sambar Server 5.0 beta2
cpe:/a:sambar:sambar_server:5.0:beta3Sambar Sambar Server 5.0 beta3
cpe:/a:sambar:sambar_server:6.0:beta2Sambar Sambar Server 6.0 Beta 2
cpe:/a:sambar:sambar_server:6.0:beta4Sambar Sambar Server 6.0 Beta 4
cpe:/a:sambar:sambar_server:5.2Sambar Sambar Server 5.2
cpe:/a:sambar:sambar_server:5.0:beta5Sambar Sambar Server 5.0 beta5
cpe:/a:sambar:sambar_server:6.0:beta3Sambar Sambar Server 6.0 Beta 3
cpe:/a:sambar:sambar_server:5.3Sambar Sambar Server 5.3
cpe:/a:sambar:sambar_server:5.1Sambar Sambar Server 5.1
cpe:/a:sambar:sambar_server:5.1:beta4Sambar Sambar Server 5.1 Beta 4
cpe:/a:sambar:sambar_server:6.0:beta5Sambar Sambar Server 6.0 Beta 5
cpe:/a:sambar:sambar_server:5.0Sambar Sambar Server 5
cpe:/a:sambar:sambar_server:5.0:beta4Sambar Sambar Server 5.0 beta4
cpe:/a:sambar:sambar_server:5.1:beta1Sambar Sambar Server 5.1 Beta 1
cpe:/a:sambar:sambar_server:6.0:beta1Sambar Sambar Server 6.0 Beta 1

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(PATCH)  XF  sambar-multiple-xss(16056)
(PATCH)  XF  sambar-multiple-vulnerabilities(13305)
(PATCH)  OSVDB  5805
(PATCH)  OSVDB  5785
(PATCH)  OSVDB  5784
(PATCH)  OSVDB  5783
(PATCH)  OSVDB  5782
(PATCH)  SECTRACK  1007819
(VENDOR_ADVISORY)  IDEFENSE  20030925 Sambar Server Multiple Vulnerabilities

- 漏洞信息

中危 跨站脚本
2003-12-31 00:00:00 2006-01-20 00:00:00
        Sambar Server 6.0 beta 6之前的版本存在多个跨站脚本攻击(XSS)漏洞。远程攻击者可以借助以下参数注入任意web脚本或HTML(1)isapi/testisa.dll,(2)testcgi.exe,(3)environ.pl的query字符串,(4)samples/search.dll的query参数,(5)mortgage.pl的price参数,(6)dumpenv.pl中的query字符串,(7)指向dumpenv.pl的query字符串,以及(8)guestbook脚本(的E-Mail字段。

- 公告与补丁

        The vendor has released an upgrade dealing with this issue.
        Sambar Server 5.1
        Sambar Server 5.2
        Sambar Server 5.3

- 漏洞信息

Sambar Server price Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Sambar Server contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "price" variable upon submission to the "" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2003-09-25 2003-02-25
2003-09-25 Unknow

- 解决方案

Upgrade to version 6.0 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者