NuSOAP 0.9.5 - 'nusoap.php' Cross-Site Scripting

admin 2023-12-09 07:18:27 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 NuSOAP 0.9.5 - 'nusoap.php' Cross-Site Scripting

CVE编号

CVE-2010-3070

利用情况

POC 已公开

补丁情况

N/A

披露时间

2010-09-29
漏洞描述
Cross-site scripting (XSS) vulnerability in NuSOAP 0.9.5, as used in MantisBT and other products, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to an arbitrary PHP script that uses NuSOAP classes.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=595248
http://git.debian.org/?p=users/olberger-guest/nusoap.git%3Ba=blob%3Bf=debian/...
http://git.debian.org/?p=users/olberger-guest/nusoap.git%3Ba=blobdiff%3Bf=deb...
http://git.mantisbt.org/?p=mantisbt.git%3Ba=commit%3Bh=edb817991b99cd5538f102...
http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048317.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048325.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048548.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048639.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048659.html
http://secunia.com/advisories/41653
http://sourceforge.net/mailarchive/message.php?msg_name=4C8FC573.3060900%40le...
http://sourceforge.net/projects/nusoap/forums/forum/193579/topic/3834005
http://www.mantisbt.org/bugs/changelog_page.php?version_id=111
http://www.mantisbt.org/bugs/view.php?id=12312
http://www.openwall.com/lists/oss-security/2010/09/03/2
http://www.openwall.com/lists/oss-security/2010/09/07/4
http://www.openwall.com/lists/oss-security/2010/09/14/12
http://www.openwall.com/lists/oss-security/2010/09/14/13
http://www.securityfocus.com/bid/42959
http://www.vupen.com/english/advisories/2010/2535
https://bugzilla.redhat.com/show_bug.cgi?id=629585
https://bugzilla.redhat.com/show_bug.cgi?id=633011
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 dietrich_ayala nusoap 0.9.5 -
运行在以下环境
系统 debian_10 nusoap * Up to (excluding) 0.7.3-4
运行在以下环境
系统 debian_11 nusoap * Up to (excluding) 0.7.3-4
运行在以下环境
系统 debian_12 nusoap * Up to (excluding) 0.7.3-4
运行在以下环境
系统 debian_sid nusoap * Up to (excluding) 0.7.3-4
运行在以下环境
系统 fedora_EPEL_5 php-nusoap * Up to (excluding) 1.1.8-4.el5
运行在以下环境
系统 ubuntu_12.04.5_lts nusoap * Up to (excluding) 0.7.3-4
阿里云评分 6.2
  • 攻击路径 远程
  • 攻击复杂度 复杂
  • 权限要求 无需权限
  • 影响范围 全局影响
  • EXP成熟度 POC 已公开
  • 补丁情况 N/A
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-79 在Web页面生成时对输入的转义处理不恰当(跨站脚本)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0