Phorum回复电子邮件地址脚本注入漏洞

漏洞信息详情

Phorum回复电子邮件地址脚本注入漏洞

漏洞简介

Phorum 3.3.2a的read.php存在跨站脚本攻击(XSS)漏洞。远程攻击者可以借助(1)t参数,或(2)电子邮件的响应主体注入任意web脚本或HTML。

漏洞公告

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: BID
名称: 4739
链接:http://www.securityfocus.com/bid/4739

来源: www.ifrance.com
链接:http://www.ifrance.com/kitetoua/tuto/5holes5.txt

来源: VULN-DEV
名称: 20020512 Security holes : Pseudo-Frame, PG, KvPoll, Phorum, BanMat
链接:http://marc.theaimsgroup.com/?l=vuln-dev&m=102121925428844&w=2

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享