漏洞信息详情
PD9 Software MegaBBSCRLF注入漏洞
漏洞简介
PD9 Software MegaBBS 2和2.1版本存在CRLF注入漏洞。攻击者可以借助thread-post.asp的writenew行为的fid参数执行HTTP响应拆分攻击。
漏洞公告
参考网址
来源: XF 名称: megabbs-response-splitting(17495) 链接:http://xforce.iss.net/xforce/xfdb/17495 来源: BUGTRAQ 名称: 20040926 Re: HTTP Response Splitting and SQL injection in megabbs forum 链接:http://marc.theaimsgroup.com/?l=bugtraq&m=109631200701134&w=2 来源: FULLDISC 名称: 20040926 HTTP Response Splitting and SQL injection in megabbs forum 链接:http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0962.html 来源: www.pd9soft.com 链接:http://www.pd9soft.com/megabbs/forums/thread-view.asp?tid=4924
受影响实体
- Pd9_software Megabbs:2.1<!--2000-1-1-->
- Pd9_software Megabbs:2<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...