DotText Cross-Site Scripting Vulnerability

王朝other·作者佚名  2006-01-10
窄屏简体版  字體: |||超大  

Title: DotText Cross-Site Scripting Vulnerability

Author: lake2, http://lake2.0x54.org

Bugtraq ID: 13450

Published: Apr 30 2005 12:00AM

Description:

DotText is an open source weblog system started by Scott Watermasysk with ASP.NET. Some weblog system is base on dottext. You can download it in http://www.gotdotnet.com/Community/Workspaces/workspace.aspx?id=e99fccb3-1a8c-42b5-90ee-348f6b77c407

Where is the bug ?

Referrers.aspx.cs

---------------

if (dataContainer is Referrer)

{

Referrer referrer = (Referrer) dataContainer;

return "<a href=\"" + referrer.ReferrerURL + "\" target=\"_new\">" + referrer.ReferrerURL.Substring(0,referrer.ReferrerURL.Length > 50 ? 50 : referrer.ReferrerURL.Length) + "</a>";

}

---------------

The showed referer isn't encoded with htmlencode , a attacker can construct a referer like as http://X/<script>alert('China')</script> to perform a cross site scripting attack if the blog system isn't disable referer show.

PS: CSDN Blog was base on GotDotNet DotText 0.95 , but now it is CSDN & Donews 0.99 , no referer :)

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
 
 
© 2005- 王朝網路 版權所有 導航