IPplan grp参数跨站脚本漏洞

2009-07-09T00:00:00
ID SSV:11770
Type seebug
Reporter Root
Modified 2009-07-09T00:00:00

Description

BUGTRAQ ID: 35037 CVE(CAN) ID: CVE-2009-1732

IPplan是用PHP编写的TCP IP地址管理软件和追踪工具。

IPplan的admin/usermanager模块没有正确地过滤用户所提交的grp参数,远程攻击者可以通过提交恶意请求执行跨站脚本攻击,导致在用户浏览器会话中执行任意HTML和脚本代码。

IPplan 4.91a 厂商补丁:

Debian

Debian已经为此发布了一个安全公告(DSA-1827-1)以及相应补丁: DSA-1827-1:New ipplan packages fix cross-site scripting 链接:http://www.debian.org/security/2009/dsa-1827

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/i/ipplan/ipplan_4.86a-7+lenny1.diff.gz Size/MD5 checksum: 24624 1337c00d254c8e9fe8ca1d7b0764c7d2 http://security.debian.org/pool/updates/main/i/ipplan/ipplan_4.86a.orig.tar.gz Size/MD5 checksum: 1463553 04a5da8b7e08fcf5bfe0afc31bb7f711 http://security.debian.org/pool/updates/main/i/ipplan/ipplan_4.86a-7+lenny1.dsc Size/MD5 checksum: 1142 37202f9941e647237b80853e536e11ef

Architecture independent packages:

http://security.debian.org/pool/updates/main/i/ipplan/ipplan_4.86a-7+lenny1_all.deb Size/MD5 checksum: 755870 2a38517b8ad7b3e1371025a4e834effd