5141
驱动牛犊
驱动牛犊
  • 注册日期2001-12-10
  • 最后登录2007-09-25
  • 粉丝0
  • 关注0
  • 积分10分
  • 威望1点
  • 贡献值0点
  • 好评度1点
  • 原创分0分
  • 专家分0分
阅读:1213回复:0

添砖加瓦

楼主#
更多 发布于:2002-07-06 14:13
   XMB is a php-based forum. This product contain a
Cross Site Scripting vulnerability that allows
attackers to insert JavaScript code (and other HTML
code) into existing messages, bypassing the internal
JavaScript/HTML code stripper.

   Exploit:

   (img)javasCript:alert(\'Hello world.\')(/img)
  
   注:上面img和/img旁边的符号应该为[]
      
   Vulnerable systems:
   All versions of XMB board, including  last version -
   XMB 1.6x Magic Lantern

   Immune systems:
   None

   Possible solution:
   Searching the image URL for the text \"javascript:\"
should solve the problem

                                      SliderGod.  

这里同样有这个问题。

[编辑 -  7/6/02 by  5141]
游客

返回顶部