漏洞信息详情

Skull-Splitter PHP ‘guestbook.php’跨站脚本攻击漏洞

漏洞简介

Soren Boysen (SkullSplitter) PHP Guestbook 2.6的guestbook.php中存在跨站脚本攻击(XSS)漏洞,远程攻击者可通过url参数注入任意Web脚本或HTML。

漏洞公告

目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:

Skull-Splitter Guestbook 2.6

Skull-Splitter Guestbook 2.75

http://www.boysen.be/en/index.php?part=scripts_guestbook

参考网址

来源: BID

名称: 17136

链接:http://www.securityfocus.com/bid/17136

来源: VUPEN

名称: ADV-2006-0974

链接:http://www.frsirt.com/english/advisories/2006/0974

来源: www.boysen.be

链接:http://www.boysen.be/en/

来源: SECUNIA

名称: 19268

链接:http://secunia.com/advisories/19268

来源: MISC

链接:http://evuln.com/vulns/104/summary.html

来源: XF

名称: skullsplitter-guestbook-xss(25293)

链接:http://xforce.iss.net/xforce/xfdb/25293

来源: BUGTRAQ

名称: 20060329 [eVuln] Skull-Splitter's PHP Guestbook XSS Vulnerability

链接:http://www.securityfocus.com/archive/1/archive/1/429254/100/0/threaded

来源: OSVDB

名称: 23941

链接:http://www.osvdb.org/23941

来源: SREASON

名称: 650

链接:http://securityreason.com/securityalert/650

来源: VIM

名称: 20060318 Vendor ACK for Skull-Splitter Guestbook XSS

链接:http://attrition.org/pipermail/vim/2006-March/000613.html

补丁

    暂无

漏洞信息快速查询

相关漏洞

更多