PunBB是一款基于PHP的论坛程序。 PunBB 1.3.6之前版本中的include/functions.php中存在多个跨站脚本攻击漏洞。远程攻击者可借助多个参数注入任意web脚本或HTML。这些参数包含:delete.php的(1) id, (2) form_sent, (3) csrf_token, (4) req_confirm或者(5) delete参数,edit.php的(6) id, (7) form_sent, (8) csrf_token, (9) req_message或者(10) submit参数,login.php的(11) action, (12) form_sent, (13) csrf_token, (14) req_email或者(15) request_pass参数,misc.php的(16) email, (17) form_sent, (18) redirect_url, (19) csrf_token, (20) req_subject, (21) req_message或者(22) submit参数,profile.php的(23) action, (24) id, (25) form_sent, (26) csrf_token, (27) req_old_password, (28) req_new_password1, (29) req_new_password2或者(30) update参数或者register.php的(31) action, (32) form_sent, (33) csrf_token, (34) req_username, (35) req_password1, (36) req_password2, (37) req_email1, (38) timezone或者(39) register参数。
PunBB是一款基于PHP的论坛程序。 PunBB 1.3.6之前版本中的include/functions.php中存在多个跨站脚本攻击漏洞。远程攻击者可借助多个参数注入任意web脚本或HTML。这些参数包含:delete.php的(1) id, (2) form_sent, (3) csrf_token, (4) req_confirm或者(5) delete参数,edit.php的(6) id, (7) form_sent, (8) csrf_token, (9) req_message或者(10) submit参数,login.php的(11) action, (12) form_sent, (13) csrf_token, (14) req_email或者(15) request_pass参数,misc.php的(16) email, (17) form_sent, (18) redirect_url, (19) csrf_token, (20) req_subject, (21) req_message或者(22) submit参数,profile.php的(23) action, (24) id, (25) form_sent, (26) csrf_token, (27) req_old_password, (28) req_new_password1, (29) req_new_password2或者(30) update参数或者register.php的(31) action, (32) form_sent, (33) csrf_token, (34) req_username, (35) req_password1, (36) req_password2, (37) req_email1, (38) timezone或者(39) register参数。