CVE-2004-1645
CVSS4.3
发布时间 :2004-08-30 00:00:00
修订时间 :2016-10-17 22:58:19
NMCOE    

[原文]Cross-site scripting (XSS) vulnerability in Xedus 1.0 allows remote attackers to execute arbitrary web script or HTML via the (1) username parameter to test.x, (2) username parameter to TestServer.x, or (3) param parameter to testgetrequest.x.


[CNNVD]Xedus Webserver多个安全漏洞(CNNVD-200408-230)

        
        Xedus是一款点对点WEB服务程序,提供多种资源的共享。
        Xedus存在多个安全问题,远程攻击者可以利用这些漏洞对服务程序进行拒绝服务攻击,跨站脚本攻击,及目录遍历攻击。
        具体问题如下:
        1. 拒绝服务
        Xedus WEB服务器在处理来自同一主机的多个连接时存在问题,会导致拒绝所有合法用户的访问。
        2. 跨站脚本攻击
        Xedus WEB服务器多个脚本不正确处理用户提交输入,攻击者可以提交恶意站点,诱使用户处理,导致敏感信息泄露。
        3. 目录遍历攻击
        提交包含多个'../'字符的数据,可绕过WEB ROOT限制,以WEB进程权限查看系统文件内容。
        

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1645
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1645
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200408-230
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=109394018411394&w=2
(UNKNOWN)  BUGTRAQ  20040830 Multiple Vulnerabilities In Xedus Webserver
http://www.gulftech.org/?node=research&article_id=00047-08302004
(UNKNOWN)  MISC  http://www.gulftech.org/?node=research&article_id=00047-08302004
http://www.securityfocus.com/bid/11071
(VENDOR_ADVISORY)  BID  11071
http://xforce.iss.net/xforce/xfdb/17166
(VENDOR_ADVISORY)  XF  xedus-test-xss(17166)

- 漏洞信息

Xedus Webserver多个安全漏洞
中危 设计错误
2004-08-30 00:00:00 2005-10-20 00:00:00
远程  
        
        Xedus是一款点对点WEB服务程序,提供多种资源的共享。
        Xedus存在多个安全问题,远程攻击者可以利用这些漏洞对服务程序进行拒绝服务攻击,跨站脚本攻击,及目录遍历攻击。
        具体问题如下:
        1. 拒绝服务
        Xedus WEB服务器在处理来自同一主机的多个连接时存在问题,会导致拒绝所有合法用户的访问。
        2. 跨站脚本攻击
        Xedus WEB服务器多个脚本不正确处理用户提交输入,攻击者可以提交恶意站点,诱使用户处理,导致敏感信息泄露。
        3. 目录遍历攻击
        提交包含多个'../'字符的数据,可绕过WEB ROOT限制,以WEB进程权限查看系统文件内容。
        

- 公告与补丁

        厂商补丁:
        Jerod Moemeka
        -------------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.thinxoft.com

- 漏洞信息 (24417)

Xedus Web Server 1.0 test.x username Parameter XSS (EDBID:24417)
windows remote
2004-09-30 Verified
0 James Bercegay
N/A [点击下载]
source: http://www.securityfocus.com/bid/11071/info

It is reported that Xedus is susceptible to multiple vulnerabilities.

The first reported issue is a denial of service vulnerability. The affected application is unable to service multiple simultaneous connections, denying access to the hosted site for legitimate users.

The second reported issue is a cross-site scripting vulnerability in included sample scripts. This vulnerability is due to a failure of the application to properly sanitize user-supplied URI input before including it in the output of the scripts.

The third reported issue is a directory traversal vulnerability. The affected application will reportedly serve documents located outside of the configured web root. This may allow an attacker the ability to read arbitrary, potentially sensitive files on the hosting computer with the privileges of the web server. This may aid malicious users in further attacks.

These vulnerabilities are reported to exist in version 1.0 of Xedus.

http://www.example.com:4274/test.x?username=[XSS]		

- 漏洞信息 (24418)

Xedus Web Server 1.0 testgetrequest.x username Parameter XSS (EDBID:24418)
windows remote
2004-09-30 Verified
0 James Bercegay
N/A [点击下载]
source: http://www.securityfocus.com/bid/11071/info
 
It is reported that Xedus is susceptible to multiple vulnerabilities.
 
The first reported issue is a denial of service vulnerability. The affected application is unable to service multiple simultaneous connections, denying access to the hosted site for legitimate users.
 
The second reported issue is a cross-site scripting vulnerability in included sample scripts. This vulnerability is due to a failure of the application to properly sanitize user-supplied URI input before including it in the output of the scripts.
 
The third reported issue is a directory traversal vulnerability. The affected application will reportedly serve documents located outside of the configured web root. This may allow an attacker the ability to read arbitrary, potentially sensitive files on the hosting computer with the privileges of the web server. This may aid malicious users in further attacks.
 
These vulnerabilities are reported to exist in version 1.0 of Xedus.

http://www.example.com:4274/testgetrequest.x?param=[XSS]		

- 漏洞信息

9388
Xedus Webserver test.x username Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Xedus Webserver contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'username' variable upon submission to the 'test.x' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2004-08-30 Unknow
2004-08-30 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站