E-Guest Guest Book脚本注入漏洞

漏洞信息详情

E-Guest Guest Book脚本注入漏洞

漏洞简介

E-Guest 1.1版本E-Guest_sign.pl存在跨站脚本攻击(XSS)漏洞。远程攻击者借助(1) full name, (2) email, (3) homepage,和(4) location参数注入任意SSI指令。

漏洞公告

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: BID
名称: 5129
链接:http://www.securityfocus.com/bid/5129

来源: BID
名称: 5128
链接:http://www.securityfocus.com/bid/5128

来源: XF
名称: eguest-ssi-command-execution(9470)
链接:http://www.iss.net/security_center/static/9470.php

来源: XF
名称: eguest-html-xss(9469)
链接:http://www.iss.net/security_center/static/9469.php

来源: BUGTRAQ
名称: 20020629 SSI & CSS execution in E-Guest (1.1) & ZAP Book (v1.0.3)
链接:http://archives.neohapsis.com/archives/bugtraq/2002-06/0388.html

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享