CVE-2004-0254
CVSS6.8
发布时间 :2004-11-23 00:00:00
修订时间 :2016-10-17 22:42:32
NMCOES    

[原文]Cross-site scripting (XSS) vulnerability in Discuz! Board 2.x and 3.x allows remote attackers to execute arbitrary script as other users via an img tag.


[CNNVD]Crossday Discuz!跨站脚本攻击(XSS)漏洞(CNNVD-200411-147)

        Discuz! Board 2.x和3.x存在跨站脚本攻击(XSS)漏洞。远程攻击者可以借助一个img关键词,用其他用户的身份执行任意脚本。

- CVSS (基础分值)

CVSS分值: 6.8 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:crosscom_olicom:discuz:3.0
cpe:/a:crosscom_olicom:discuz:2.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0254
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0254
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200411-147
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=107606726417150&w=2
(UNKNOWN)  BUGTRAQ  20040205 Possible Cross Site Scripting in Discuz! Board
http://www.securityfocus.com/bid/9584
(UNKNOWN)  BID  9584
http://xforce.iss.net/xforce/xfdb/15066
(UNKNOWN)  XF  discuzboard-image-tag-xss(15066)

- 漏洞信息

Crossday Discuz!跨站脚本攻击(XSS)漏洞
中危 跨站脚本
2004-11-23 00:00:00 2007-01-02 00:00:00
远程  
        Discuz! Board 2.x和3.x存在跨站脚本攻击(XSS)漏洞。远程攻击者可以借助一个img关键词,用其他用户的身份执行任意脚本。

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息 (23653)

Crossday Discuz! 2.0/3.0 Cross Site Scripting Vulnerability (EDBID:23653)
php webapps
2004-02-05 Verified
0 Cheng Peng Su
N/A [点击下载]
source: http://www.securityfocus.com/bid/9584/info

It has been reported that Discuz! is prone to an Cross Site Scripting vulnerability. This issue is caused by the application failing to properly sanitize links embedded within user messages. Upon successful exploitation of this issue, a malicious user could steal cookie based authentication credentials or other information within the context of the affected web page.

[img]http://a.gif');alert(document.cookie);a=escape=('a[/img]		

- 漏洞信息

3871
Discuz! Board Message IMG Tag XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Crossday Discuz! contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate message content upon submission to the application. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2004-02-05 Unknow
2004-02-05 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Crossday Discuz! Cross Site Scripting Vulnerability
Input Validation Error 9584
Yes No
2004-02-05 12:00:00 2009-07-12 02:06:00
Discovery of this issue is credited to Cheng Peng Su <apple_soup@msn.com>.

- 受影响的程序版本

Crossday Discuz! 3.0
Crossday Discuz! 2.0

- 漏洞讨论

It has been reported that Discuz! is prone to an Cross Site Scripting vulnerability. This issue is caused by the application failing to properly sanitize links embedded within user messages. Upon successful exploitation of this issue, a malicious user could steal cookie based authentication credentials or other information within the context of the affected web page.

- 漏洞利用

There is no exploit required to leverage this issue. The following proof of concept has been provided:

Include the following text within a message:

[img]http://a.gif');alert(document.cookie);a=escape=('a[/img]

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站