ezpublish_xss.nasl

来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 65 行

NASL
65
字号
## written by K-Otik.com <ReYn0@k-otik.com>## ezPublish Cross Site Scripting Bugs##  Message-ID: <1642444765.20030319015935@olympos.org>#  From: Ertan Kurt <mailto:ertank@olympos.org>#  To: <bugtraq@securityfocus.com>#  Subject: Some XSS vulns#if (description){ script_id(11449); script_bugtraq_id(7137, 7138); script_cve_id("CVE-2003-0310"); script_version ("$Revision: 38 $"); script_name(english:"ezPublish Cross Site Scripting Bugs"); desc["english"] = "ezPublish 2.2.7  has a cross site scripting bug. An attacker may use it to perform a cross site scripting attack on this host.In addition to this, another flaw may allow an attacker store hostileHTML code on the server side, which will be executed by the browser of theadministrative user when he looks at the server logs.Solution : Upgrade to a newer version.Risk factor : Medium"; script_description(english:desc["english"]); script_summary(english:"Determine if ezPublish is vulnerable to xss attack"); script_category(ACT_GATHER_INFO); script_family(english:"CGI abuses : XSS", francais:"Abus de CGI"); script_copyright(english:"This script is Copyright (C) 2003 k-otik.com"); script_dependencie("find_service.nes", "no404.nasl", "cross_site_scripting.nasl"); script_require_ports("Services/www", 80); script_exclude_keys("Settings/disable_cgi_scanning"); exit(0);}include("http_func.inc");include("http_keepalive.inc");port = get_http_port(default:80);if(!get_port_state(port))exit(0);if(get_kb_item(string("www/", port, "/generic_xss"))) exit(0);foreach d (cgi_dirs()){ url = string(d, "/search/?SectionIDOverride=1&SearchText=<script>window.alert(document.cookie);</script>"); req = http_get(item:url, port:port); buf = http_keepalive_send_recv(port:port, data:req, bodyonly:1); if( buf == NULL ) exit(0);   if("<script>window.alert(document.cookie);</script>" >< buf)   {    security_warning(port:port);    exit(0);   }}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?