漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2010-0142
漏洞标题:19楼持久型XSS、敏感信息泄露
相关厂商:十九楼
漏洞作者: blue
提交时间:2010-07-30 21:30
修复时间:2010-08-30 00:00
公开时间:2010-08-30 00:00
漏洞类型:xss跨站脚本攻击
危害等级:中
自评Rank:10
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2010-07-30: 细节已通知厂商并且等待厂商处理中
2010-08-02: 厂商已经确认,细节仅向厂商公开
2010-08-12: 细节向核心白帽子及相关领域专家公开
2010-08-22: 细节向普通白帽子公开
2010-09-01: 细节向实习白帽子公开
2010-08-30: 细节向公众公开
简要描述:
XSS位置较明显,一些地方会泄露sql数据信息
详细说明:
个人空间DIY时可以使用expression,IE6、IE7测试通过
漏洞证明:
http://blog.19lou.com/?18202069 (请用IE6,IE7查看)
http://blog.19lou.com/user/69/diy_css_18202069.cache.css
在DIY中,sql处理过慢时,会出现类似以下:
Time: 2010-7-30 7:28pm
Script: /spacecp.php
SQL: UPDATE [Table]userspacefields SET layout='1', showside='0', choiceblockmain='newblog,mythread,bbsthread,newimage,newgoods,newfile,newlink', choiceblockleft='photo,action,calendar,archive,search,visitor,track,friend,guestbook,comment,favorite,userlink,music,information,rss', choiceblockright='', diy='a:28:{s:9:"bodycolor";s:0:"";s:9:"bodyimage";s:0:"";s:10:"bodyrepeat";s:0:"";s:14:"bodyattachment";s:0:"";s:9:"headcolor";s:0:"";s:9:"headimage";s:0:"";s:13:"headtextcolor";s:0:"";s:10:"headrepeat";s:0:"";s:12:"contentcolor";s:0:"";s:12:"contentimage";s:0:"";s:13:"contentrepeat";s:0:"";s:9:"sidecolor";s:0:"";s:9:"sideimage";s:0:"";s:10:"siderepeat";s:0:"";s:15:"blocktitlecolor";s:0:"";s:15:"blocktitleimage";s:0:"";s:19:"blocktitletextcolor";s:0:"";s:16:"blocktitlerepeat";s:0:"";s:10:"blockcolor";s:0:"";s:14:"blocktextcolor";s:0:"";s:10:"blockimage";s:0:"";s:11:"blockrepeat";s:0:"";s:9:"maincolor";s:20:"expression(alert(1))";s:9:"mainimage";s:0:"";s:10:"mainrepeat";s:0:"";s:9:"fontcolor";s:0:"";s:9:"linkcolor";s:0:"";s:6:"cursor";s:0:"";}' WHERE uid='18202069'
Error: MySQL server has gone away
Errno.: 2006
Similar error report has beed dispatched to administrator before.
修复方案:
修改x-space源码,过滤出问题位置.当然cookie重要部分使用了HttpOnly,很不错.
版权声明:转载请注明来源 blue@乌云
漏洞回应
厂商回应:
危害等级:低
漏洞Rank:3
确认时间:2010-08-02 12:54
厂商回复:
已经确认,立即修补 谢谢blue
最新状态:
暂无