新聞中心
英特爾安全中心是家提供英特爾產(chǎn)品安全問題咨詢的機構?!巴ㄟ^安全警告和安全告示,英特爾一直在致力于改善我們的客戶計算環(huán)境的安全。

創(chuàng)新互聯(lián)公司專注于網(wǎng)站建設|企業(yè)網(wǎng)站維護|優(yōu)化|托管以及網(wǎng)絡推廣,積累了大量的網(wǎng)站設計與制作經(jīng)驗,為許多企業(yè)提供了網(wǎng)站定制設計服務,案例作品覆蓋成都不銹鋼雕塑等行業(yè)。能根據(jù)企業(yè)所處的行業(yè)與銷售的產(chǎn)品,結(jié)合品牌形象的塑造,量身設計品質(zhì)網(wǎng)站。
因為它們的出現(xiàn),我們將致力于迅速解決該問題,并提供解決問題建議,”在主頁網(wǎng)站上的一條消息說明。
在http://security-center.intel.com上的跨站腳本漏洞是一個名叫Methodman的黑客發(fā)現(xiàn)的。這個安全漏洞似乎影響到所有咨詢網(wǎng)頁,可以使用個人發(fā)布的惡意軟件,進行釣魚或各種不同的惡意攻擊。
Methodman公布了代碼的和截圖證明,演示攻擊者如何注入任意的IFRAME網(wǎng)址或引發(fā)重定向到另一個鏈接。此外,劫持cookie會話或開惡意玩笑也是可能的。作者寫完這篇文章時,該漏洞仍然存在。
原文如下:
Intel Security Center Lacks Security
A cross-site scripting flaw affecting the Intel Product Security Center website has been disclosed. Successful exploitation allows for rogue iframe injection, arbitrary redirection and session cookie hijacking.
The Intel Security Center is home to advisories regarding security issues that affect Intel products. "Intel is focused on improving the security of our customers computing environments. We are committed to rapidly addressing issues as they arise, and providing recommendations through security advisories and security notices," a message on the website's main page notes.
The XSS weakness on http://security-center.intel.com has been discovered by a hacker going by the nickname of Methodman. The flaw seems to affect all advisory pages and can be used by ill-intentioned individuals to distribute malware, launch phishing campaigns, or instrument various malicious attacks.
The proof-of-concept code and screenshots published by Methodman demonstrate how poor URL validation allows an attacker to inject an arbitrary iframe or trigger a redirection to another link. In addition, revealing session cookies or launching rogue alerts is also possible. At the time this article was being writtten, the flaws were still active.
當前名稱:譯文:英特爾安全中心爆跨站漏洞
網(wǎng)頁鏈接:http://www.dlmjj.cn/article/cdghdhj.html


咨詢
建站咨詢
