漏洞信息详情
SWsoft Plesk Reloaded Login_name参数跨站脚本漏洞
漏洞简介
Plesk 7.0版本和7.1版本Reloaded存在跨站脚本(XSS)漏洞。远程攻击者可以借助login_name参数注入任意web脚本或HTML。
漏洞公告
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] .
参考网址
来源: XF 名称: plesk-loginname-xss(17085) 链接:http://xforce.iss.net/xforce/xfdb/17085 来源: BID 名称: 11024 链接:http://www.securityfocus.com/bid/11024 来源: OSVDB 名称: 9149 链接:http://www.osvdb.org/9149 来源: SECTRACK 名称: 1011042 链接:http://securitytracker.com/id?1011042 来源: SECUNIA 名称: 12368 链接:http://secunia.com/advisories/12368 来源: FULLDISC 名称: 20041223 Plesk 7 Cross-Site Scripting 链接:http://archives.neohapsis.com/archives/fulldisclosure/2004-12/0554.html 来源: FULLDISC 名称: 20040824 Re: [Full-Disclosure] XSS in Plesk 7.1 Reloaded 链接:http://archives.neohapsis.com/archives/fulldisclosure/2004-08/1031.html 来源: FULLDISC 名称: 20040824 XSS in Plesk 7.1 Reloaded 链接:http://archives.neohapsis.com/archives/fulldisclosure/2004-08/1022.html
受影响实体
- Swsoft Plesk:7.0<!--2000-1-1-->
- Swsoft Plesk:7.1<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...