CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
EPSS
Percentile
70.3%
The remote host is running PayProCart, a shopping cart software program written in PHP. The remote version of this software contains an input validation flaw in the file ‘usrdetails.php’ that could allow an attacker to use the remote host to perform a cross-site scripting attack.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if(description)
{
script_id(17996);
script_version("1.16");
script_cve_id("CVE-2005-1004");
script_bugtraq_id(13002);
script_name(english:"ProfitCode PayProCart usrdetails.php sgnuptype Parameter XSS");
script_set_attribute(attribute:"synopsis", value:
"The remote host has an application that is affected by a
cross-site scripting vulnerability." );
script_set_attribute(attribute:"description", value:
"The remote host is running PayProCart, a shopping cart
software program written in PHP. The remote version of this software
contains an input validation flaw in the file
'usrdetails.php' that could allow an attacker to use the remote
host to perform a cross-site scripting attack." );
script_set_attribute(attribute:"solution", value:
"Upgrade to the newest version of this software." );
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
script_set_attribute(attribute:"plugin_publication_date", value: "2005/04/07");
script_set_attribute(attribute:"vuln_publication_date", value: "2005/04/04");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();
script_summary(english:"Checks PayProCart");
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.");
script_family(english:"CGI abuses : XSS");
script_dependencie("http_version.nasl");
script_require_ports("Services/www", 80);
script_exclude_keys("Settings/disable_cgi_scanning");
script_require_keys("www/PHP");
exit(0);
}
# Check starts here
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:80);
if ( ! can_host_php(port:port) )
exit(1, "The remote Web Server on port "+port+" does not support PHP.");
foreach dir (make_list( cgi_dirs()))
{
res = http_send_recv3(port:port, method:"GET", item:dir + "/usrdetails.php?sgnuptype=csaleID<script>nessus</script>", exit_on_fail: 1);
if('<input type="hidden" name="sgnuptype" value="csaleID<script>nessus</script>' >< res[2] )
{
security_warning(port);
set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
exit(0);
}
}
exit(0, "usrdetails.php was not found on port "+port+" or is not vulnerable.");