网站地图    收藏   

主页 > 后端 > 网站安全 >

XpressEngine 1.4.5.7持久xss缺陷及修复 - 网站安全 -

来源:自学PHP网    时间:2015-04-17 14:47 作者: 阅读:

[导读] # Exploit Title: XpressEngine version 1.4.5.7 Persistent XSS Vulnerability# Author: v0nSch3lling# Software Link: http://www.xpressengine.com# Version: 1.4.5.7# Tested on: Microso......

# Exploit Title: XpressEngine version 1.4.5.7 Persistent XSS Vulnerability 

# Author: v0nSch3lling 

# Software Link: http://www.xpressengine.com

# Version: 1.4.5.7 

# Tested on: Microsoft Windows XP SP2 

 

# Case 1. Memeber Management(Delete Account) 

    - Target : Memeber Management http://[www.2cto.com]/[XE_PATH]/index.php?module=admin&act=dispMemberAdminDeleteForm&member_srl=[ACCOUNT_NUMBER

    - Method : Enter the XSS script in Nickname field. 

               Though the nickname length is 20 in signin step, the variable length is 40 in DB schema. 

               So you can enter nickname with length 40. 

               You can modify nickname field by local web proxy when you submit user information. 

    - PoC : [XSS_SCRIPT] 

    - Exploit : When the administrator delete a user account 

    - Note : By this vulnerability, you can attack to the only administrator. 

      

# Case 2. Member Management(Listup Account) 

    - Target : Member Management http://[www.2cto.com]/[XE_PATH]/index.php?module=admin&act=dispMemberAdminInfo&member_srl=[ACCOUNT_NUMBER

                                 http://[www.2cto.com]/[XE_PATH]/index.php?module=admin&act=dispMemberAdminList

    - Method : Enter the XSS script in Homepage & Blog field 

        - PoC : ">[String]</a>[XSS_SCRIPT]// 

        - Exploit : When the administrator access the member management page 

                         When the administrator access the member information page 

        - Note : By this vulnerability, you can attack to the only administrator

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论