<% dim ModuleName,InfoID,ChannelShortName,CorrelativeArticle,InstallDir,ChannelDir,Keyword,PageTitle,ArticleIntro,Articlecontent Keyword=stripHTML("attackers,remote") PageTitle=stripHTML("WebWasher Classic 2.2/3.3 Error Message Cross-Site Scripting Vulnerability") ArticleIntro=stripHTML("77169.com小编引言:WebWasher Classic 2.2/3.3 Error Message Cross-Site Scripting Vulnerability,漏洞的主要原因:") Articlecontent=stripHTML("source: http://www.securityfocus.com/bid/9039/info

It has been reported that a …") ModuleName = stripHTML("exploits") InfoID = stripHTML("170477") ChannelShortName=stripHTML("漏洞") InstallDir=stripHTML("http://www.77169.com/") ChannelDir=stripHTML("exploits") %> WebWasher Classic 2.2/3.3 Error Message Cross-Site Scripting Vulnerability - 华盟网 - http://www.77169.com
您现在的位置: 华盟网 >> 漏洞 >> 最新漏洞 >> 其它漏洞 >> 正文

WebWasher Classic 2.2/3.3 Error Message Cross-Site Scripting Vulnerability

2003/11/11 作者:不祥 来源: 互联网
导读 <% if len(ArticleIntro)<3 then Response.Write Articlecontent 'Response.Write "Articlecontent" else Response.Write ArticleIntro 'Response.Write "ArticleIntro" end if %>
source: http://www.securityfocus.com/bid/9039/info

It has been reported that a cross-site scripting vulnerability may exist in WebWasher Classic that may allow remote attackers to execute HTML or script code in a user's browser. The issue is reported to occur due to error messages returned to the user. User-supplied data is not properly sanitized therefore allowing an attacker to a construct a malicious link containing HTML or script code that may be rendered in a user's browser.

WebWasher Classic versions 3.3 Build 44 and 2.2.1 are reported to be prone to this issue, however other versions may be affected as well. 

http://www.example.com/<script>alert("WASH_ME")</script>