📄 ezpublish_xss.nasl
字号:
## written by K-Otik.com <ReYn0@k-otik.com>## ezPublish Cross Site Scripting Bugs## Message-ID: <1642444765.20030319015935@olympos.org># From: Ertan Kurt <mailto:ertank@olympos.org># To: <bugtraq@securityfocus.com># Subject: Some XSS vulns#if (description){ script_id(11449); script_bugtraq_id(7137, 7138); script_cve_id("CVE-2003-0310"); script_version ("$Revision: 38 $"); script_name(english:"ezPublish Cross Site Scripting Bugs"); desc["english"] = "ezPublish 2.2.7 has a cross site scripting bug. An attacker may use it to perform a cross site scripting attack on this host.In addition to this, another flaw may allow an attacker store hostileHTML code on the server side, which will be executed by the browser of theadministrative user when he looks at the server logs.Solution : Upgrade to a newer version.Risk factor : Medium"; script_description(english:desc["english"]); script_summary(english:"Determine if ezPublish is vulnerable to xss attack"); script_category(ACT_GATHER_INFO); script_family(english:"CGI abuses : XSS", francais:"Abus de CGI"); script_copyright(english:"This script is Copyright (C) 2003 k-otik.com"); script_dependencie("find_service.nes", "no404.nasl", "cross_site_scripting.nasl"); script_require_ports("Services/www", 80); script_exclude_keys("Settings/disable_cgi_scanning"); exit(0);}include("http_func.inc");include("http_keepalive.inc");port = get_http_port(default:80);if(!get_port_state(port))exit(0);if(get_kb_item(string("www/", port, "/generic_xss"))) exit(0);foreach d (cgi_dirs()){ url = string(d, "/search/?SectionIDOverride=1&SearchText=<script>window.alert(document.cookie);</script>"); req = http_get(item:url, port:port); buf = http_keepalive_send_recv(port:port, data:req, bodyonly:1); if( buf == NULL ) exit(0); if("<script>window.alert(document.cookie);</script>" >< buf) { security_warning(port:port); exit(0); }}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -