现在的位置: 首页 > 综合 > 正文

DotText Cross-Site Scripting Vulnerability

2013年10月13日 ⁄ 综合 ⁄ 共 925字 ⁄ 字号 评论关闭

Title: DotText Cross-Site Scripting Vulnerability

Author: lake2, http://lake2.0x54.org

Bugtraq ID:  13450

Published: Apr 30 2005 12:00AM

Description:

      DotText is an open source weblog system started by Scott Watermasysk with ASP.NET. Some weblog system is base on dottext. You can download it in http://www.gotdotnet.com/Community/Workspaces/workspace.aspx?id=e99fccb3-1a8c-42b5-90ee-348f6b77c407

Where is the bug ?

Referrers.aspx.cs

---------------

if (dataContainer is Referrer)
{
 Referrer referrer = (Referrer) dataContainer;
 return "<a href=/"" + referrer.ReferrerURL + "/" target=/"_new/">" + referrer.ReferrerURL.Substring(0,referrer.ReferrerURL.Length > 50 ? 50 : referrer.ReferrerURL.Length) + "</a>";
}

---------------

The showed referer isn't encoded with htmlencode , a attacker can construct a referer like as http://X/<script>alert('China')</script> to perform a cross site scripting attack if the blog system isn't disable referer show.

PS:  CSDN Blog was base on GotDotNet DotText 0.95 ,  but now it is CSDN & Donews 0.99 , no referer :)

抱歉!评论已关闭.