CVE编号
CVE-2008-7220利用情况
暂无补丁情况
官方补丁披露时间
2009-09-14漏洞描述
1.6.0.2之前的原型JavaScript framework(prototypejs)存在未明漏洞,攻击者可借助未知向量发出“跨站点ajax请求”。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://github.com/sstephenson/prototype/blob/master/CHANGELOG | |
http://osvdb.org/46312 | |
http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html | |
http://seclists.org/fulldisclosure/2019/May/10 | |
http://seclists.org/fulldisclosure/2019/May/11 | |
http://seclists.org/fulldisclosure/2019/May/13 | |
http://secunia.com/advisories/37479 | |
http://secunia.com/advisories/37677 | |
http://www.debian.org/security/2009/dsa-1952 | |
http://www.openwall.com/lists/oss-security/2009/11/07/2 | |
https://bugzilla.redhat.com/show_bug.cgi?id=523277 | |
https://bugzilla.redhat.com/show_bug.cgi?id=533137 | |
https://lists.apache.org/thread.html/2ad48cd9d47edd0e677082eb869115809473a117... | |
https://lists.apache.org/thread.html/6d1b9a75a004dab42c81e8aa149d90e6fd26ce8c... | |
https://lists.apache.org/thread.html/769fcc5f331b61c4d7ce16b807678e9a1799628d... | |
https://lists.apache.org/thread.html/7ba863c5a4a0f1230cba2d11cf4de3a2eda3a42e... | |
https://lists.apache.org/thread.html/eff7280055fc717ea8129cd28a9dd57b8446d00b... | |
https://seclists.org/bugtraq/2019/May/18 | |
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00789.html | |
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00838.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | prototypejs | prototype_javascript_framework | * |
Up to (including) 1.6.0.1 |
|||||
运行在以下环境 | |||||||||
应用 | prototypejs | prototype_javascript_framework | 1.5.0 | - | |||||
运行在以下环境 | |||||||||
应用 | prototypejs | prototype_javascript_framework | 1.5.1 | - | |||||
运行在以下环境 | |||||||||
应用 | prototypejs | prototype_javascript_framework | 1.6.0.1 | - | |||||
运行在以下环境 | |||||||||
系统 | debian_4.0 | mt-daapd | * |
Up to (excluding) 0.2.4+r1376-1.1+etch3 |
|||||
运行在以下环境 | |||||||||
系统 | debian_5.0 | mt-daapd | * |
Up to (excluding) 1:1.4.21.2~dfsg-3+lenny1 |
- 攻击路径 远程
- 攻击复杂度 容易
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 传输被破坏
- 服务器危害 无影响
- 全网数量 N/A
还没有评论,来说两句吧...