CVE-2005-1162
CVSS5.8
发布时间 :2005-05-02 00:00:00
修订时间 :2016-10-17 23:17:38
NMCOS    

[原文]Multiple cross-site scripting (XSS) vulnerabilities in OneWorldStore allow remote attackers to inject arbitrary web script or HTML via the (1) sEmail parameter to owContactUs.asp, (2) bSub parameter to owListProduct.asp, or the (3) Name, (4) Email, or (5) Comment fields in owProductDetail.asp.


[CNNVD]OneWorldStore OWContactUs.ASP跨站脚本漏洞(CNNVD-200505-291)

        OneWorldStore中存在多个跨站脚本攻击漏洞,允许远程攻击者通过(1)owContactUs.asp的sEmail参数,(2)owListProduct.asp的bSub参数或者owProductDetail.asp中的(3)Name,(4)Email或(5)Comment字段来注入任意Web脚本或HTML。

- CVSS (基础分值)

CVSS分值: 5.8 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1162
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1162
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-291
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=111352017704126&w=2
(UNKNOWN)  BUGTRAQ  20050414 Multiple multiple sql injection/errors and xss vulnerabilities in OneWorldStore
http://securitytracker.com/id?1013720
(PATCH)  SECTRACK  1013720
http://www.oneworldstore.com/support_security_issue_updates.asp#April_15_2005_DCrab
(VENDOR_ADVISORY)  CONFIRM  http://www.oneworldstore.com/support_security_issue_updates.asp#April_15_2005_DCrab
http://www.securityfocus.com/bid/13184
(PATCH)  BID  13184
http://www.securityfocus.com/bid/13185
(PATCH)  BID  13185
http://www.securityfocus.com/bid/13186
(PATCH)  BID  13186
http://xforce.iss.net/xforce/xfdb/20096
(UNKNOWN)  XF  oneworldstore-xss(20096)

- 漏洞信息

OneWorldStore OWContactUs.ASP跨站脚本漏洞
中危 跨站脚本
2005-05-02 00:00:00 2005-10-20 00:00:00
远程  
        OneWorldStore中存在多个跨站脚本攻击漏洞,允许远程攻击者通过(1)owContactUs.asp的sEmail参数,(2)owListProduct.asp的bSub参数或者owProductDetail.asp中的(3)Name,(4)Email或(5)Comment字段来注入任意Web脚本或HTML。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://oneworldstore.com/support_updates.asp

- 漏洞信息

15521
OneWorldStore owContactUs.asp sEmail Parameter XSS
Remote / Network Access Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public Vendor Verified

- 漏洞描述

OneWorldStore contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'sEmail' variable upon submission to the owContactus.asp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2005-04-14 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

OneWorldStore OWProductDetail.ASP HTML Injection Vulnerability
Input Validation Error 13186
Yes No
2005-04-14 12:00:00 2009-07-12 12:56:00
dcrab <dcrab@hackerscenter.com> is credited with the discovery of this vulnerability.

- 受影响的程序版本

OneWorldStore OneWorldStore

- 漏洞讨论

OneWorldStore is prone to an HTML injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would be able to access properties of the site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.

- 漏洞利用

No exploit is required.

- 解决方案

The vendor has addressed this issue in the latest release of the application. Please see the referenced vendor advisory on obtaining and applying updates.


OneWorldStore OneWorldStore

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站