发布时间 :2005-05-02 00:00:00
修订时间 :2017-07-10 21:32:33

[原文]Multiple cross-site scripting (XSS) vulnerabilities in OneWorldStore allow remote attackers to inject arbitrary web script or HTML via the (1) sEmail parameter to owContactUs.asp, (2) bSub parameter to owListProduct.asp, or the (3) Name, (4) Email, or (5) Comment fields in owProductDetail.asp.

[CNNVD]OneWorldStore OWContactUs.ASP跨站脚本漏洞(CNNVD-200505-291)


- CVSS (基础分值)

CVSS分值: 5.8 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20050414 Multiple multiple sql injection/errors and xss vulnerabilities in OneWorldStore
(PATCH)  SECTRACK  1013720
(PATCH)  BID  13184
(PATCH)  BID  13185
(PATCH)  BID  13186
(UNKNOWN)  XF  oneworldstore-xss(20096)

- 漏洞信息

OneWorldStore OWContactUs.ASP跨站脚本漏洞
中危 跨站脚本
2005-05-02 00:00:00 2005-10-20 00:00:00

- 公告与补丁


- 漏洞信息

OneWorldStore owContactUs.asp sEmail Parameter XSS
Remote / Network Access Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public Vendor Verified

- 漏洞描述

OneWorldStore contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'sEmail' variable upon submission to the owContactus.asp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2005-04-14 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

OneWorldStore OWProductDetail.ASP HTML Injection Vulnerability
Input Validation Error 13186
Yes No
2005-04-14 12:00:00 2009-07-12 12:56:00
dcrab <> is credited with the discovery of this vulnerability.

- 受影响的程序版本

OneWorldStore OneWorldStore

- 漏洞讨论

OneWorldStore is prone to an HTML injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would be able to access properties of the site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.

- 漏洞利用

No exploit is required.

- 解决方案

The vendor has addressed this issue in the latest release of the application. Please see the referenced vendor advisory on obtaining and applying updates.

OneWorldStore OneWorldStore

- 相关参考