[原文]Cross-site scripting (XSS) vulnerability in blocker_query.php in Protector System 1.15b1 allows remote attackers to inject arbitrary web script or HTML via the (1) target or (2) portNum parameters.
Multiple vulnerabilities were reported to exist in Protector System, which is a third-party module for PHP-Nuke. Cross-site scripting and SQL injection vulnerabilities were reported.
Exploitation of these issues may reveal sensitive information, allow for account hijacking, content manipulation and attacks against the underlying database.
These issues were reported to exist in Protector System 1.15b1. Other versions may also be affected.
http://www.example.com/nuke72/admin/modules/blocker_query.php?target=foobar.com">[xss code here]
http://www.example.com/nuke72/admin/modules/blocker_query.php?target=foobar.com&queryType=all&portNum=foobar[xss code here]
Protector System blocker_query.php Multiple Parameter XSS
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity
Protector System contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "target" and "portNum" variables upon submission to the "blocker_query.php" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Currently, there are no known workarounds or upgrades to correct this issue. However, Protector Systems has released a patch to address this vulnerability.