CVE-2004-2007
CVSS4.3
发布时间 :2004-05-08 00:00:00
修订时间 :2016-10-17 23:04:42
NMCOE    

[原文]Cross-site scripting (XSS) vulnerability in modules.php in NukeJokes 1.7 and 2 Beta allows remote attackers to inject arbitrary HTML or web script via the (1) cat parameter in a CatView function or (2) jokeid parameter in a JokeView function.


[CNNVD]PHP-Nuke Adam Webb NukeJokes模块多个输入验证漏洞(CNNVD-200405-052)

        
        NukeJokes是一款PHP-Nuke系统的模块,用于制作笑话集。
        NukeJokes对用户提交的数据缺少充分过滤,远程攻击者可以利用这个漏洞获得敏感信息,或修改数据库信息。
        由于对用户提交的URI参数缺少检查,提交不合法的数据给这些参数,可导致路径泄露,跨站脚本,和SQL注入攻击等问题。
        

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:adam_webb:nukejokes:2.0_beta
cpe:/a:adam_webb:nukejokes:1.7

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2007
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2007
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200405-052
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=108404714232579&w=2
(UNKNOWN)  BUGTRAQ  20040508 [waraxe-2004-SA#028 - Multiple vulnerabilities in NukeJokes module for PhpNuke]
http://www.securityfocus.com/bid/10306
(VENDOR_ADVISORY)  BID  10306
http://xforce.iss.net/xforce/xfdb/16096
(VENDOR_ADVISORY)  XF  nukejokes-modules-xss(16096)

- 漏洞信息

PHP-Nuke Adam Webb NukeJokes模块多个输入验证漏洞
中危 输入验证
2004-05-08 00:00:00 2005-10-20 00:00:00
本地  
        
        NukeJokes是一款PHP-Nuke系统的模块,用于制作笑话集。
        NukeJokes对用户提交的数据缺少充分过滤,远程攻击者可以利用这个漏洞获得敏感信息,或修改数据库信息。
        由于对用户提交的URI参数缺少检查,提交不合法的数据给这些参数,可导致路径泄露,跨站脚本,和SQL注入攻击等问题。
        

- 公告与补丁

        厂商补丁:
        Adam Webb
        ---------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://funportal.beanwebb.com/modules.php?name=Work_Board&op=Project&project_id=4

- 漏洞信息 (24099)

Adam Webb NukeJokes 1.7/2.0 Module Multiple Parameter XSS (EDBID:24099)
php webapps
2004-05-08 Verified
0 Janek Vind
N/A [点击下载]
source: http://www.securityfocus.com/bid/10306/info

It has been reported that the NukeJokes module is affected by multiple input validation vulnerabilities. These issues are due to a failure of the application to properly sanitize user supplied user input.

Multiple SQL injection issues exists due to a failure of the application to do any sanitization on user input prior to using the offending input in an SQL query.

These SQL issues may allow a remote attacker to manipulate query logic, potentially leading to unauthorized access to sensitive information such as the administrator password hash or corruption of database data.

Multiple cross-site scripting vulnerabilities have been reported to exist due to a failure of the application to properly sanitize user-supplier input before its inclusion in dynamic web content. 

These cross-site scripting issues could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were followed, the hostile code may be rendered in the web browser of the victim user.

http://www.example.com/nuke72/modules.php?name=NukeJokes&func=CatView&cat=[xss code here]
http://www.example.com/nuke72/modules.php?name=NukeJokes&func=JokeView&jokeid=[xss code here]		

- 漏洞信息

6012
PHP-Nuke NukeJokes Module Multiple Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

NukeJokes contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "cat" or "jokeid" variable upon submission to the NukeJokes module. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2004-05-08 Unknow
2004-05-08 Unknow

- 解决方案

Upgrade to version 2.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站