Lucene search

K
nessusThis script is Copyright (C) 2004-2021 and is owned by Tenable, Inc. or an Affiliate thereof.SWSOFT_PLESK_XSS.NASL
HistoryAug 25, 2004 - 12:00 a.m.

Plesk Reloaded login_up.php3 login_name Parameter XSS

2004-08-2500:00:00
This script is Copyright (C) 2004-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
435

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.009

Percentile

82.9%

The remote host is running Plesk Reloaded (from SWsoft), a web-based system administration tool.

The remote version of this software is vulnerable to a cross-site scripting attack because of its failure to sanitize user input to the ‘login_name’ parameter of the ‘login_up.php3’ script. This issue can be used to take advantage of the trust between a client and server allowing the malicious user to execute malicious JavaScript on the client’s machine.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#


include('deprecated_nasl_level.inc');
include('compat.inc');

if(description)
{
 script_id(14369);
 script_version("1.27");

 script_cve_id("CVE-2004-2702");
 script_bugtraq_id(11024);
 script_xref(name:"Secunia", value:"12368");
 
 script_name(english:"Plesk Reloaded login_up.php3 login_name Parameter XSS");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP script that is affected by a
cross-site scripting vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote host is running Plesk Reloaded (from SWsoft), a web-based
system administration tool. 

The remote version of this software is vulnerable to a cross-site
scripting attack because of its failure to sanitize user input to the
'login_name' parameter of the 'login_up.php3' script.  This issue can
be used to take advantage of the trust between a client and server
allowing the malicious user to execute malicious JavaScript on the
client's machine." );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2004/Aug/1055" );
 script_set_attribute(attribute:"solution", value:
"Reportedly the vendor has issued patches, which are available via its
website or the software's autoupdate feature." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(79);
 script_set_attribute(attribute:"plugin_publication_date", value: "2004/08/25");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/08/24");
 script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 summary["english"] = "Checks for the presence of an XSS bug in Plesk Reloaded";
 
 script_summary(english:summary["english"]);
 
 script_category(ACT_ATTACK);
 
 script_copyright(english:"This script is Copyright (C) 2004-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
 family["english"] = "CGI abuses : XSS";
 script_family(english:family["english"]);
 script_dependencie("cross_site_scripting.nasl", "http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("www/PHP", "Settings/ParanoidReport");
 exit(0);
}

#
# The script code starts here
#
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80, php: 1, no_xss: 1);

test_cgi_xss( port: port, cgi: "/login_up.php3", 
	      qs: "login_name=<script>foo</script>",
	      pass_str: '<script>foo</script>' );

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.009

Percentile

82.9%

Related for SWSOFT_PLESK_XSS.NASL