发布时间 :2004-12-31 00:00:00
修订时间 :2011-03-07 21:18:12

[原文]Cross-site scripting (XSS) vulnerability in blocker_query.php in Protector System 1.15b1 allows remote attackers to inject arbitrary web script or HTML via the (1) target or (2) portNum parameters.

[CNNVD]Protector System blocker_query.php跨站脚本漏洞(CNNVD-200412-259)

        Protector System 1.15b1版本的blocker_query.php存在跨站脚本漏洞。远程攻击者借助(1) target或者(2) portNum参数注入任意的web脚本或者HTML。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(PATCH)  BID  10206
(UNKNOWN)  XF  protector-blockerquery-xss(15965)
(UNKNOWN)  BUGTRAQ  20040423 [waraxe-2004-SA#025 - Multiple vulnerabilities in Protector for PhpNuke]

- 漏洞信息

Protector System blocker_query.php跨站脚本漏洞
中危 跨站脚本
2004-12-31 00:00:00 2005-10-20 00:00:00
        Protector System 1.15b1版本的blocker_query.php存在跨站脚本漏洞。远程攻击者借助(1) target或者(2) portNum参数注入任意的web脚本或者HTML。

- 公告与补丁


- 漏洞信息 (24048)

Protector System 1.15 blocker_query.php Multiple Parameter XSS (EDBID:24048)
php webapps
2004-04-23 Verified
0 waraxe
N/A [点击下载]
Multiple vulnerabilities were reported to exist in Protector System, which is a third-party module for PHP-Nuke. Cross-site scripting and SQL injection vulnerabilities were reported.
Exploitation of these issues may reveal sensitive information, allow for account hijacking, content manipulation and attacks against the underlying database.
These issues were reported to exist in Protector System 1.15b1. Other versions may also be affected.">[xss code here][xss code here]		

- 漏洞信息

Protector System blocker_query.php Multiple Parameter XSS
Remote / Network Access Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

Protector System contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "target" and "portNum" variables upon submission to the "blocker_query.php" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2004-04-23 Unknow
2004-04-23 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Protector Systems has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者