| CVE-2008-1355 |
|
发布时间 :2008-03-17 13:44:00 | ||
| 修订时间 :2008-09-05 17:37:31 | ||||
| NMCO |
[原文]Cross-site scripting (XSS) vulnerability in index.php in Jeebles Technology Jeebles Directory 2.9.60 allows remote attackers to inject arbitrary web script or HTML via the path parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[CNNVD]Jeebles Technology Jeebles Directory ‘index.php’跨站脚本攻击漏洞(CNNVD-200803-248)
Jeebles Technology Jeebles Directory中index.php中存在跨站脚本攻击漏洞。远程攻击者通过路径参数来注入任意web脚本或HTML代码。
–
CVSS (基础分值)
| CVSS分值: | 4.3 | [中等(MEDIUM)] |
| 机密性影响: | NONE | [对系统的机密性无影响] |
| 完整性影响: | PARTIAL | [可能会导致系统文件被修改] |
| 可用性影响: | NONE | [对系统可用性无影响] |
| 攻击复杂度: | MEDIUM | [漏洞利用存在一定的访问条件] |
| 攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
| 身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
| CWE-79 | [在Web页面生成时对输入的转义处理不恰当(跨站脚本)] |
–
CPE (受影响的平台与产品)
| 产品及版本信息(CPE)暂不可用 |
–
OVAL (用于检测的技术细节)
| 未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
|
http://xforce.iss.net/xforce/xfdb/41183 (UNKNOWN) XF jeeblesdirectory-path-xss(41183) |
|
http://www.securityfocus.com/bid/28221 (UNKNOWN) BID 28221 |
|
http://downloads.securityfocus.com/vulnerabilities/exploits/28221.html (UNKNOWN) MISC http://downloads.securityfocus.com/vulnerabilities/exploits/28221.html |
–
漏洞信息
| Jeebles Technology Jeebles Directory ‘index.php’跨站脚本攻击漏洞 | |
| 中危 | 跨站脚本 |
| 2008-03-17 00:00:00 | 2008-09-05 00:00:00 |
| 远程 | |
| Jeebles Technology Jeebles Directory中index.php中存在跨站脚本攻击漏洞。远程攻击者通过路径参数来注入任意web脚本或HTML代码。 | |
–
公告与补丁
|
目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://code.google.com/p/jeeblesdirectory/ |
–
漏洞信息
43331 |
|
| Jeebles Directory index.php path Parameter XSS | |
Remote / Network Access |
Input Manipulation |
| Loss of Integrity | Solution Unknown |
| Exploit Public | Uncoordinated Disclosure |
–
漏洞描述
| Jeebles Directory contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'path' variables upon submission to the 'index.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
–
时间线
2008-03-12 |
Unknow |
| 2008-03-12 | Unknow |







![[美图] 华彩典子最后的纪念-微慑信息网-VulSee.com](http://images.anime.xunlei.com/collection/origin/12/152756447f4620d91421b2a5e95d13206939ef0145b707.jpg)

![[GO] http请求の模块-微慑信息网-VulSee.com](https://vulsee.com/wp-content/uploads/2024/03/f14df9ce90c84d123ee4b413176ba391.png)

![[八卦] 王婷婷—揭秘一个大三女生的性爱录像-微慑信息网-VulSee.com](http://free.86hy.com/crack/pic/1.jpg)
![[随笔]今天国际警察节-微慑信息网-VulSee.com](http://photo.sohu.com/20041017/Img222528326.jpg)

青云网
