发布时间 :2005-11-16 02:42:00
修订时间 :2017-07-10 21:33:13

[原文]Cross-site scripting (XSS) vulnerability in u2u.php in XMB 1.9.3 allows remote attackers to inject arbitrary web script or HTML via the username parameter.

[CNNVD]XMB U2U.PHP跨站脚本漏洞(CNNVD-200511-161)

        XMB 是一款以MySQL用PHP编写的基于WEB的论坛程序,可使用在多种Linux和Unix操作系统下。
        XMB 1.9.3的u2u.php中的跨站脚本攻击(XSS)漏洞,可让远程攻击者通过用户名参数注入任意Web脚本或HTML。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20051104 Xss - Html injection in XMB
(UNKNOWN)  BID  15342
(UNKNOWN)  VUPEN  ADV-2005-2333
(UNKNOWN)  XF  xmb-u2u-xss(22990)

- 漏洞信息

XMB U2U.PHP跨站脚本漏洞
中危 跨站脚本
2005-11-16 00:00:00 2005-11-16 00:00:00
        XMB 是一款以MySQL用PHP编写的基于WEB的论坛程序,可使用在多种Linux和Unix操作系统下。
        XMB 1.9.3的u2u.php中的跨站脚本攻击(XSS)漏洞,可让远程攻击者通过用户名参数注入任意Web脚本或HTML。

- 公告与补丁


- 漏洞信息

XMB u2u.php username Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Exploit Public Uncoordinated Disclosure

- 漏洞描述

XMB contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the 'username' parameter upon submission to the 'u2u.php' script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.

- 时间线

2005-11-04 Unknow
2005-11-04 Unknow

- 解决方案

Upgrade to version 1.9.8 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

XMB U2U.PHP Cross-Site Scripting Vulnerability
Input Validation Error 15342
Yes No
2005-11-07 12:00:00 2008-09-10 09:00:00
HACKERS PAL is credited with the discovery of this vulnerability.

- 受影响的程序版本

XMB Forum 1.9.3
XMB Forum 1.9.8

- 不受影响的程序版本

XMB Forum 1.9.8

- 漏洞讨论

XMB is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. A successful exploit could allow an attacker to steal cookie-based authentication credentials and launch other attacks.

- 漏洞利用

No exploit is required.

An example URI has been provided:[code]

- 解决方案

A vendor update is available. Contact the vendor for more information.

- 相关参考