发布时间 :2006-07-25 19:04:00
修订时间 :2011-03-07 21:39:36

[原文]Cross-site scripting (XSS) vulnerability in CGI wrapper for IP Calculator (IPCalc) 0.40 allows remote attackers to inject arbitrary web script or HTML via the URI (REQUEST_URI environment variable), which is used in the actionurl variable.

[CNNVD]IP Calculator CGI wrapper 跨站脚本攻击(XSS)漏洞(CNNVD-200607-423)

        IP Calculator (IPCalc) 0.40的CGI wrapper存在跨站脚本攻击(XSS)漏洞。远程攻击者可以借助actionurl变量中使用的URI(REQUEST_URI环境变量), 注入任意Web脚本或HTML。

- CVSS (基础分值)

CVSS分值: 2.6 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  VUPEN  ADV-2006-2944
(UNKNOWN)  FULLDISC  20060722 Low security hole affecting IPCalc's CGI wrapper
(UNKNOWN)  XF  ipcalculator-ipcalc-xss(27924)
(UNKNOWN)  BID  19130
(UNKNOWN)  BUGTRAQ  20060727 Re: Low security hole affecting IPCalc's CGI wrapper
(UNKNOWN)  BUGTRAQ  20060722 Low security hole affecting IPCalc's CGI wrapper

- 漏洞信息

IP Calculator CGI wrapper 跨站脚本攻击(XSS)漏洞
低危 跨站脚本
2006-07-25 00:00:00 2006-07-28 00:00:00
        IP Calculator (IPCalc) 0.40的CGI wrapper存在跨站脚本攻击(XSS)漏洞。远程攻击者可以借助actionurl变量中使用的URI(REQUEST_URI环境变量), 注入任意Web脚本或HTML。

- 公告与补丁


- 漏洞信息

IP Calculator Wrapper REQUEST_URI XSS
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Exploit Private Vendor Verified

- 漏洞描述

IPCalc contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the REQUEST_URI parameter upon submission to the CGI. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.

- 时间线

2006-07-22 2006-07-05
2006-07-22 Unknow

- 解决方案

Upgrade to version 0.41 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete