发布时间 :2005-05-26 00:00:00
修订时间 :2008-09-05 16:50:05

[原文]Multiple cross-site scripting (XSS) vulnerabilities in BookReview beta 1.0 allow remote attackers to inject arbitrary web script or HTML via the node parameter to (1) add_review.htm, (2) suggest_review.htm, (3) suggest_category.htm, (4) add_booklist.htm, or (5) add_url.htm, the isbn parameter to (6) add_review.htm, (7) add_contents.htm, (8) add_classification.htm, the (9) chapters parameter to the add_contents page in index.php (aka add_contents.htm), (10) the user parameter to contact.htm, or (11) the submit[string] parameter to search.htm. NOTE: it is not clear whether BookReview is available to the public. If not, then it should not be included in CVE.


        BookReview beta 1.0存在多个跨站脚本攻击(XSS)漏洞,远程攻击者可以通过传给(1)add_review.htm,(2)suggest_review.htm,(3)suggest_category.htm,(4)add_booklist.htm或(5)add_url.htm的结点参数,传给(6)add_review.htm,(7)add_contents.htm,(8)add_classification.htm的isbn参数,传给index.php(又称add_contents.htm)内的add_contents页的(9)chapters参数,传给contact.htm的(10)user参数,或者传给search.htm的(11)submit[string]参数,注入任意Web脚本或HTML。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源

- 漏洞信息

中危 跨站脚本
2005-05-26 00:00:00 2006-08-23 00:00:00
        BookReview beta 1.0存在多个跨站脚本攻击(XSS)漏洞,远程攻击者可以通过传给(1)add_review.htm,(2)suggest_review.htm,(3)suggest_category.htm,(4)add_booklist.htm或(5)add_url.htm的结点参数,传给(6)add_review.htm,(7)add_contents.htm,(8)add_classification.htm的isbn参数,传给index.php(又称add_contents.htm)内的add_contents页的(9)chapters参数,传给contact.htm的(10)user参数,或者传给search.htm的(11)submit[string]参数,注入任意Web脚本或HTML。

- 公告与补丁


- 漏洞信息

BookReview add_review.htm Multiple Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

BookReview contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate multiple variables upon submission to the add_review.htm script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity or confidentiality.

- 时间线

2005-05-26 2005-04-27
2005-05-26 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

BookReview Multiple Cross-Site Scripting Vulnerabilities
Input Validation Error 13783
Yes No
2005-05-26 12:00:00 2009-07-12 02:56:00
Lostmon <> is credited with the discovery of these vulnerabilities.

- 受影响的程序版本

BookReview BookReview 1.0

- 漏洞讨论

BookReview is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

- 漏洞利用

No exploit is required.

The following proof of concept URI are available:;node=%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;review=true;node=Political_Science&amp;review=true;node="&gt;&lt;script&gt;alert(document.cookie)&lt;/script&gt;&amp;review=true;isbn=\\"&gt;&lt;script&gt;alert(document.cookie)&lt;/script&gt;;isbn=083081423X%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;chapters=25;isbn=083081423X&amp;chapters=25%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E;submit%5Bstring%5D=%5C%22%3E%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&amp;submit=Ok&amp;submit%5Btype%5D=author;node=Gospels"&gt;&lt;SCRIPT&gt;alert()&lt;/SCRIPT&gt;

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考