<% dim ModuleName,InfoID,ChannelShortName,CorrelativeArticle,InstallDir,ChannelDir,Keyword,PageTitle,ArticleIntro,Articlecontent Keyword=stripHTML("scripting,site") PageTitle=stripHTML("IdealBB 1.4.9 Error.ASP Cross-Site Scripting Vulnerability") ArticleIntro=stripHTML("77169.com小编引言:IdealBB 1.4.9 Error.ASP Cross-Site Scripting Vulnerability,漏洞的主要原因:") Articlecontent=stripHTML("source: http://www.securityfocus.com/bid/8360/info

IdealBB error.asp page has b…") ModuleName = stripHTML("exploits") InfoID = stripHTML("170641") ChannelShortName=stripHTML("漏洞") InstallDir=stripHTML("http://www.77169.com/") ChannelDir=stripHTML("exploits") %> IdealBB 1.4.9 Error.ASP Cross-Site Scripting Vulnerability - 华盟网 - http://www.77169.com
您现在的位置: 华盟网 >> 漏洞 >> 最新漏洞 >> 其它漏洞 >> 正文

IdealBB 1.4.9 Error.ASP Cross-Site Scripting Vulnerability

2003/8/5 作者:不祥 来源: 互联网
导读 <% if len(ArticleIntro)<3 then Response.Write Articlecontent 'Response.Write "Articlecontent" else Response.Write ArticleIntro 'Response.Write "ArticleIntro" end if %>
source: http://www.securityfocus.com/bid/8360/info

IdealBB error.asp page has been reported prone to a cross-site scripting vulnerability.

The issue presents itself due to a lack of sufficient sanitization performed by functions in the error.asp script on user-influenced URI parameters. This vulnerability may be exploited to permit the theft of cookie authentication credentials if a malicious link is followed. Other attacks may also be possible.

http://www.example.com/idealbb/error.asp?e=16&sessionID={xxxxxxxx-xxxx-xxxx-
xxxx-xxxxxxxxxxxx}&msg=<script>alert('Zone-h')</script>