漏洞信息详情
Bajie HTTP Server 实例脚本和程序跨站脚本漏洞
漏洞简介
Bajie Java HTTP Server 0.95 到0.95zxv4版本存在跨站脚本(XSS)漏洞。远程攻击者借助(1)test.txt的字符串查询,(2)custMsg程序的guestName参数,或者(3)CookieExample程序的cookiename参数注入任意web脚本或者HTML。
漏洞公告
The author has fixed this issue in version 0.95zxv4 versions available on October 16th. Bajie Java HTTP Server 0.95 d
- Bajie httpsrv.95zxv4rel.zip http://www.utdallas.edu/~gxz014000/websrv/httpsrv.95zxv4rel.zip
- Bajie httpsrv.95zxv4rel.zip http://www.utdallas.edu/~gxz014000/websrv/httpsrv.95zxv4rel.zip
- Bajie httpsrv.95zxv4rel.zip http://www.utdallas.edu/~gxz014000/websrv/httpsrv.95zxv4rel.zip
- Bajie httpsrv.95zxv4rel.zip http://www.utdallas.edu/~gxz014000/websrv/httpsrv.95zxv4rel.zip
- Bajie httpsrv.95zxv4rel.zip http://www.utdallas.edu/~gxz014000/websrv/httpsrv.95zxv4rel.zip
- Bajie httpsrv.95zxv4rel.zip http://www.utdallas.edu/~gxz014000/websrv/httpsrv.95zxv4rel.zip
参考网址
来源: BID 名称: 8841 链接:http://www.securityfocus.com/bid/8841 来源: BUGTRAQ 名称: 20031016 CSS Vulnerability in Bajie HTTP JServer 链接:http://www.securityfocus.com/archive/1/341452 来源: SREASON 名称: 3306 链接:http://securityreason.com/securityalert/3306 来源: SECUNIA 名称: 10023 链接:http://secunia.com/advisories/10023 来源: www.geocities.com 链接:http://www.geocities.com/gzhangx/websrv/docs/security.html
受影响实体
- Bajie Java_http_server:0.95<!--2000-1-1-->
- Bajie Java_http_server:0.95:D<!--2000-1-1-->
- Bajie Java_http_server:0.95:Zxc<!--2000-1-1-->
- Bajie Java_http_server:0.95:Zxe<!--2000-1-1-->
- Bajie Java_http_server:0.95:Zxe1<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...