Cross site scripting in mephisto 0.7.3

看板Bugtraq作者時間19年前 (2007/04/13 03:09), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/2 (看更多)
--nextPart3966432.34Y0XMDAVR Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Content-Disposition: inline Cross site scripting in mephisto 0.7.3 security advisory References: http://www.mephistoblog.com http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1873 Description: Cross site scripting describes attacks that allow to insert malicious html or javascript code via get or post forms. This can be used to steal session cookies. mephisto is a rails-based blog application. The search function can be used to inject javascript code. Workaround/Fix: There's no vendor fix. Vendor has been contacted 2007-03-10 and replied that they were working on the issue. Sample injection URL: http://demo.mephistoblog.com/search?q=%3Cscript%3Ealert%281%29%3C%2Fscript%3E CVE Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2007-1873 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. Credits and copyright: This vulnerability was discovered by Hanno Boeck of schokokeks.org webhosting. It's licensed creative commons attribution: http://creativecommons.org/licenses/by/3.0/ Hanno Boeck, 2007-04-12, http://www.hboeck.de --nextPart3966432.34Y0XMDAVR Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.3 (GNU/Linux) iD8DBQBGHXLGr2QksT29OyARAn34AJ49r2Hy18ItS3HC5dEa6K13H56rSgCeLeze Dw5prhm9v431xDxrPu3qjG8= =xJIl -----END PGP SIGNATURE----- --nextPart3966432.34Y0XMDAVR--
文章代碼(AID): #167eFp00 (Bugtraq)
文章代碼(AID): #167eFp00 (Bugtraq)