PHP-Nuke Gbook模块HTML注入漏洞

漏洞信息详情

PHP-Nuke Gbook模块HTML注入漏洞

漏洞简介

Php-Nuke 1.0版本的Gbook存在跨站脚本(XSS)漏洞。远程攻击者借助多个参数注入任意web脚本或者HTML,这些参数包括: (1)name,(2)email,(3)city,和(4)message,它们不使用<script>和<style> 标签,且不能被PHP-Nuke过滤.

漏洞公告

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: XF
名称: gbook-message-html-injection(15027)
链接:http://xforce.iss.net/xforce/xfdb/15027

来源: BID
名称: 9559
链接:http://www.securityfocus.com/bid/9559

来源: BUGTRAQ
名称: 20040202 [waraxe-2004-SA#001] – Script injection in GBook for Php-Nuke ver. 1.0
链接:http://www.securityfocus.com/archive/1/352373

来源: SECTRACK
名称: 1008930
链接:http://securitytracker.com/id?1008930

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享