CVE-2006-1642
CVSS2.6
发布时间 :2006-04-06 06:04:00
修订时间 :2011-03-07 21:33:28
NMCO    

[原文]Cross-site scripting (XSS) vulnerability in Interact 2.1.1 allows remote attackers to inject arbitrary web script or HTML via (1) the search_terms parameter to (a) search.php, and (2) the first_name, (3) last_name, (4) email, (5) password, and (6) confirm_password parameters to (b) userinput.php. NOTE: the provenance of this information is unknown; the details are obtained from third party. In addition, the lack of precision in the third party descriptions makes it unclear whether the named vectors are correct.


[CNNVD]Interact 跨站脚本攻击漏洞(CNNVD-200604-064)

        借助于到(a)search.php(1)search_terms参数,和到userinput.php的(2)first_name,(3)last_name参数,(4)email参数,(5)password参数,和(6)confirm_password参数,Interact 2.1.1的跨站脚本漏洞可让远程攻击者注入任意Web脚本或HTML。

- CVSS (基础分值)

CVSS分值: 2.6 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:interact:interact:2.1
cpe:/a:interact:interact:1.9
cpe:/a:interact:interact:2.0
cpe:/a:interact:interact:1.9.1
cpe:/a:interact:interact:1.8.7
cpe:/a:interact:interact:2.1.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1642
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1642
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200604-064
(官方数据源) CNNVD

- 其它链接及资源

http://www.vupen.com/english/advisories/2006/1244
(UNKNOWN)  VUPEN  ADV-2006-1244
http://secunia.com/advisories/19488
(VENDOR_ADVISORY)  SECUNIA  19488
http://xforce.iss.net/xforce/xfdb/25652
(UNKNOWN)  XF  interact-search-xss(25652)
http://www.osvdb.org/24461
(UNKNOWN)  OSVDB  24461
http://www.osvdb.org/24389
(UNKNOWN)  OSVDB  24389

- 漏洞信息

Interact 跨站脚本攻击漏洞
低危 跨站脚本
2006-04-06 00:00:00 2006-04-07 00:00:00
远程  
        借助于到(a)search.php(1)search_terms参数,和到userinput.php的(2)first_name,(3)last_name参数,(4)email参数,(5)password参数,和(6)confirm_password参数,Interact 2.1.1的跨站脚本漏洞可让远程攻击者注入任意Web脚本或HTML。

- 公告与补丁

        

- 漏洞信息

24389
Interact search.php search_terms Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Interact contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'search_terms' variable upon submission to the search.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2006-04-05 Unknow
2006-04-05 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站