Lucene search

K
nessusThis script is Copyright (C) 2010-2021 Tenable Network Security, Inc.ADAUDIT_PLUS_REPORTLIST_XSS.NASL
HistoryJun 02, 2010 - 12:00 a.m.

ManageEngine ADAudit Plus 'reportList' Parameter XSS

2010-06-0200:00:00
This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.
www.tenable.com
20

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

50.8%

The version of ADAudit Plus installed on the remote web server has a cross-site scripting vulnerability. Input passed to the ‘reportList’ parameter of ‘jsp/audit/reports/ExportReport.jsp’ is not properly sanitized before it is used to generate dynamic HTML content.

An unauthenticated, remote attacker may be able to leverage this issue to inject arbitrary HTML or script code into a user’s browser to be executed within the security context of the affected site.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');


if (description)
{
  script_id(46790);
  script_version("1.13");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2010-2049");
  script_bugtraq_id(40253);
  script_xref(name:"Secunia", value:"39876");

  script_name(english:"ManageEngine ADAudit Plus 'reportList' Parameter XSS");
  script_summary(english:"Attempts a non-persistent XSS");

  script_set_attribute(attribute:"synopsis",value:
"A web application on the remote host has a cross-site scripting
vulnerability."
  );
  script_set_attribute(attribute:"description",value:
"The version of ADAudit Plus installed on the remote web server has a
cross-site scripting vulnerability.  Input passed to the 'reportList'
parameter of 'jsp/audit/reports/ExportReport.jsp' is not properly
sanitized before it is used to generate dynamic HTML content.

An unauthenticated, remote attacker may be able to leverage this issue
to inject arbitrary HTML or script code into a user's browser to be
executed within the security context of the affected site.");

  script_set_attribute(attribute:"solution", value:"Unknown at this time.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

  script_set_attribute(attribute:"vuln_publication_date", value:"2010/05/19");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/06/02");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses : XSS");

  script_copyright(english:"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.");

  script_dependencies("adaudit_plus_detect.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 8080);
  script_require_keys("www/adaudit_plus");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("webapp_func.inc");


port = get_http_port(default:8080);
install = get_install_from_kb(appname:'adaudit_plus', port:port, exit_on_fail:TRUE);

dir = install['dir']+'/jsp/audit/reports/';
cgi = 'ExportReport.jsp';
xss = '"</iframe><script>alert('+"'"+SCRIPT_NAME+'-'+unixtime()+"'"+')</script>';

expected_output = 'reportList='+xss;

exploited = test_cgi_xss(
  port:port,
  dirs:make_list(dir),
  cgi:cgi,
  qs:'reportList='+xss,
  pass_str:expected_output,
  ctrl_re:'<title>Export Report *</title>'
);

if (!exploited)
  exit(0, build_url(qs:dir+cgi, port:port) + " is not affected.");

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

50.8%

Related for ADAUDIT_PLUS_REPORTLIST_XSS.NASL