发布时间 :2005-06-09 00:00:00
修订时间 :2008-09-05 16:50:24

[原文]The web server control panel in 602LAN SUITE 2004 allows remote attackers to make it more difficult for the administrator to read portions of log files via a "</pre><!-" sequence in an HTTP GET request in the logon, possibly due to a cross-site scripting (XSS) vulnerability.

[CNNVD]602LAN SUITE 2004 跨站脚本攻击漏洞(CNNVD-200506-061)

        602LAN SUITE 2004中的web服务器控制面板存在安全漏洞,远程攻击者借助登录的HTTP GET请求中的"

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源

- 漏洞信息

602LAN SUITE 2004 跨站脚本攻击漏洞
中危 跨站脚本
2005-06-09 00:00:00 2006-04-07 00:00:00
        602LAN SUITE 2004中的web服务器控制面板存在安全漏洞,远程攻击者借助登录的HTTP GET请求中的"

- 公告与补丁


- 漏洞信息

602LAN SUITE Log File Processing HTML Tag Obfuscation
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public Vendor Verified

- 漏洞描述

602LAN SUITE contains a flaw that may allow remote manipulation of log data. The issue is triggered when a remote user submits an HTTP GET request for the string "</pre><!--". From that point, subsequent log entries will not be displayed when the administrator views the log file until the string " --><pre>" is encountered. This log manipulation can be used by a remote attacker to obfuscate records of other attack attempts, and will result in loss of log integrity for the service. Administrators can still see the log entries by viewing the HTML source of the logs.

- 时间线

2005-06-06 Unknow
2005-06-06 Unknow

- 解决方案

Upgrade to build 2004.0.05.0623 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者