关键信息 漏洞名称: Cag CMS Version 0.2 Beta 下载链接: 描述: PHP/MySQL-based CMS that allows webmasters to control every element of their site design while still allowing contributors to dynamically and easily create new public pages for their sites, eliminating the complicated template systems of other CMS. 漏洞类型 XSS: Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them. SQL Injection: Input passed to the "id" parameter in index.php is not properly verified before being used to sql query. This can be exploited thru the web browser and get the hash password from users. 利用示例 XSS Exploit: - - alert('xss') SQL Injection Exploit: - 解决方案 Your script should filter metacharacters from user input. Edit the source code to ensure that input is properly verified. Check detailed information for more information about fixing this vulnerability.