发布时间 :2006-05-23 21:02:00
修订时间 :2011-03-07 21:36:29

[原文]Cross-site scripting (XSS) vulnerability in Jemscripts DownloadControl 1.0 allows remote attackers to inject arbitrary HTML or web script via the dcid parameter to dc.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. This issue appears to be independent from a different issue that involves the same vector.

[CNNVD]Jemscripts DownloadControl dc.php 跨站脚本攻击(XSS)漏洞(CNNVD-200605-424)

        Jemscripts DownloadControl 1.0存在跨站脚本攻击(XSS)漏洞。 远程攻击者可以借助对dc.php的dcid参数,注入任意HTML或web脚本。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  VUPEN  ADV-2006-1928
(UNKNOWN)  BUGTRAQ  20060519 Jemscripts Download Control v1.0
(UNKNOWN)  VIM  20060523 Jemscripts DownloadControl 1.0 - at least 2 separate issues
(UNKNOWN)  XF  downloadcontrol-dc-xss(26624)

- 漏洞信息

Jemscripts DownloadControl dc.php 跨站脚本攻击(XSS)漏洞
中危 跨站脚本
2006-05-23 00:00:00 2006-05-24 00:00:00
        Jemscripts DownloadControl 1.0存在跨站脚本攻击(XSS)漏洞。 远程攻击者可以借助对dc.php的dcid参数,注入任意HTML或web脚本。

- 公告与补丁


- 漏洞信息

JemScripts DownloadControl dc.php dcid Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

JemSCripts contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'dcid' variable upon submission to the db.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2006-05-23 Unknow
2006-05-23 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者