[原文]Cross-site scripting (XSS) vulnerability in the Activity and Events Viewer for Newtelligence DasBlog allows remote attackers to inject arbitrary web script or HTML via the (1) User Agent or (2) Referrer HTTP headers.
DasBlog is reportedly susceptible to an HTML injection vulnerability in its request log. This vulnerability is due to a failure of the application to properly sanitize user-supplied input data before using it in the generation of dynamic web pages.
This may allow an attacker to inject malicious HTML and script code into the application. An administrator displaying the 'Activity and Events Viewer' will have the attacker-supplied script code executed within their browser in the context of the vulnerable site. This issue may be leverage to steal cookie based authentication credentials. Other attacks are also possible.
Although this issue reportedly affects versions 1.3 through 1.6 of the affected software.
GET / HTTP/1.1
DasBlog contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate "User-Agent:" and "Referer:" HTTP header values upon submission to the The Activity and Events Viewer script. This could allow a user to create a specially crafted HTTP request that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Currently, there are no known workarounds or upgrades to correct this issue. However, DasBlog has released a patch to address this vulnerability.