网站地图    收藏   

主页 > 后端 > 网站安全 >

Wordpress插件Quick Contact Form 6.0 持久型xss - 网站安全

来源:自学PHP网    时间:2015-04-17 10:16 作者: 阅读:

[导读] =======================标题=====Quick Contact Form - Persistent Cross Site Scripting Vulnerability作者======Zy0d0x开发者======Quick Plugins - http: quick-plugins com 受影响产品========...

=======================
标题
=====
 
Quick Contact Form - Persistent Cross Site Scripting Vulnerability
 
作者
======
 
Zy0d0x
 
开发者
======
 
Quick Plugins - http://quick-plugins.com/
 
受影响产品
================
 
Quick Contact Form  Wordpress Plugin Version 6.0 possibly earlier
 
 
VULNERABILITY CLASS
===================
 
Cross-Site Scripting
 
 
描述
===========
 
 
Quick Contact Form suffers from a persistent Cross-Site Scripting vulnerability due to a lack
of input validation and output sanitization of the qcfname4 paramater.
Other input fields are also effective to reflective cross site scripting.
 
 
测试证明
================
 
Enter the following into the field where Quick Contact Form requests a Message.
 
--- SNIP ---
 
"><script>alert(String.fromCharCode(90,121,48,100,48,120))</script><
 
--- SNIP ---
 
If the message has been sent successfully a alert diolog will apear containing Zy0d0x when an user checks there message in the dashboard.
 
 
影响
======
 
An attacker could potentially hijack session authentication tokes of remote users and leverage the
vulnerability to increase the attack vector to the underlying software and operating system of the victim.
 
 级别
============
高危
 
状态
======
新版v6.1已经修复
 
 

 

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论