发布时间 :2006-02-24 06:02:00
修订时间 :2017-07-19 21:30:08

[原文]Cross-site scripting vulnerability in Easy Forum 2.5 allows remote attackers to inject arbitrary web script or HTML via the image variable.

[CNNVD]Easy Forum 跨站脚本攻击漏洞(CNNVD-200602-377)

        Easy Forum 2.5中存在跨站脚本攻击漏洞。远程攻击者可以借助image变量注入任意Web脚本或HTML。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20060304 [eVuln] Easy Forum XSS Vulnerability
(UNKNOWN)  BID  16958
(UNKNOWN)  VUPEN  ADV-2006-0706
(UNKNOWN)  XF  easyforum-join-xss(24831)

- 漏洞信息

Easy Forum 跨站脚本攻击漏洞
中危 跨站脚本
2006-02-24 00:00:00 2006-02-24 00:00:00
        Easy Forum 2.5中存在跨站脚本攻击漏洞。远程攻击者可以借助image变量注入任意Web脚本或HTML。

- 公告与补丁

        Easy Forum Easy Forum 2.5
        Easy Forum 'security' fix

- 漏洞信息 (F44414)

EV0085.txt (PacketStormID:F44414)
2006-03-08 00:00:00
Aliaksandr Hartsuyeu

Easy Forum version 2.5 is susceptible to cross site scripting attacks.

New eVuln Advisory:
Easy Forum XSS Vulnerability

eVuln ID: EV0085
CVE: CVE-2006-0877
Software: Easy Forum
Sowtware's Web Site:
Versions: 2.5
Critical Level: Harmless
Type: Cross-Site Scripting
Class: Remote
Status: Patched
Exploit: Available
Solution: Available
Discovered by: Aliaksandr Hartsuyeu (

Vulnerable script: join.php
Variable $image isn't properly sanitized.

Arbitrary script code insertion is possible in image URL when registering new user.

Available at:

Cross-Site Scripting Example:

URL: http://[host]/eforum/join.php
Image file (URL): javascript:alert(123) sometext.gif

Vendor-provided patch is available now.

Discovered by: Aliaksandr Hartsuyeu (

Aliaksandr Hartsuyeu - Penetration Testing Services

- 漏洞信息

Easy Forum join.php image Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Unknown

- 漏洞描述

Easy Forum contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the Image URL field ('image' variable) upon submission to the 'join.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2006-02-21 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

Easy Forum New User Image File HTML Injection Vulnerability
Input Validation Error 16958
Yes No
2006-03-04 12:00:00 2006-03-08 09:55:00
Discovery is credited to Aliaksandr Hartsuyeu.

- 受影响的程序版本

Easy Forum Easy Forum 2.5

- 漏洞讨论

Easy Forum is prone to an HTML-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the affected website, potentially allowing for the theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.

This issue is reported to affect version 2.5. Other versions may also be vulnerable.

- 漏洞利用

These issues can be exploited through use of a web client.

Example 'Image File' data sufficient to demonstrate this issue was provided:
javascript:alert(123) sometext.gif

- 解决方案

The vendor has re-released version 2.5 with a fix included, and has also released a patch to address this issue.

Easy Forum Easy Forum 2.5

- 相关参考