CVE-2004-1537
CVSS4.3
发布时间 :2004-12-31 00:00:00
修订时间 :2016-10-17 22:56:01
NMCOE    

[原文]Cross-site scripting (XSS) vulnerability in popup.php in PHPKIT 1.6.03 through 1.6.1 allows remote attackers to execute arbitrary web script via the img parameter.


[CNNVD]PHPKIT远程SQL注入跨站脚本漏洞(CNNVD-200412-228)

        
        PHPKIT是一款基于WEB的消息论坛系统。
        PHPKIT对用户提交的URL参数缺少充分过滤,远程攻击者可以利用这个漏洞获得敏感信息,或者对数据库进行操作。
        'include.php'脚本对用户提交的参数数据缺少充分过滤,提交包含恶意SQL命令的数据作为参数,可更改原来的SQL逻辑,可能获得敏感信息或操作数据库。
        另外对部分HTML恶意数据也缺少过滤,构建恶意链接,可导致基于验证的COOKIE信息泄露。
        

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:phpkit:phpkit:1.6.02
cpe:/a:phpkit:phpkit:1.6.03
cpe:/a:phpkit:phpkit:1.6.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1537
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1537
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-228
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=110117116115493&w=2
(UNKNOWN)  BUGTRAQ  20041122 PHPKIT SQL Injection, XSS
http://www.securityfocus.com/bid/11725
(UNKNOWN)  BID  11725
http://xforce.iss.net/xforce/xfdb/18204
(UNKNOWN)  XF  phpkit-popup-xss(18204)

- 漏洞信息

PHPKIT远程SQL注入跨站脚本漏洞
中危 输入验证
2004-12-31 00:00:00 2005-10-20 00:00:00
远程  
        
        PHPKIT是一款基于WEB的消息论坛系统。
        PHPKIT对用户提交的URL参数缺少充分过滤,远程攻击者可以利用这个漏洞获得敏感信息,或者对数据库进行操作。
        'include.php'脚本对用户提交的参数数据缺少充分过滤,提交包含恶意SQL命令的数据作为参数,可更改原来的SQL逻辑,可能获得敏感信息或操作数据库。
        另外对部分HTML恶意数据也缺少过滤,构建恶意链接,可导致基于验证的COOKIE信息泄露。
        

- 公告与补丁

        厂商补丁:
        PHPKIT
        ------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.phpkit.de/

- 漏洞信息 (24762)

PHPKIT 1.6 Multiple Input Validation Vulnerabilities (EDBID:24762)
php webapps
2004-11-22 Verified
0 Steve
N/A [点击下载]
source: http://www.securityfocus.com/bid/11725/info

It is reported that PHPKIT is susceptible to cross-site scripting and SQL injection vulnerabilities.

The cross-site scripting issue is present in a parameter of the 'popup.php' script. An attacker can exploit this issue by creating a malicious link containing HTML and script code and send this link to a vulnerable user. This can allow for theft of cookie-based authentication credentials and other attacks.

An SQL injection issue exists in the application as well. This issue affects a parameter of the 'print.php' script. Due to this, attackers may supply malicious parameters to manipulate the structure and logic of SQL queries.

http://www.example.com/phpkit/popup.php?img="><script>alert(document.cookie)</script>
http://www.example.com/phpkit/include.php?path=guestbook/print.php&id=1'		

- 漏洞信息

12109
PHPKIT popup.php img Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

PHPKIT contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'img' variables upon submission to the 'popup.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2004-11-22 Unknow
2004-11-22 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站