ID CLAROLINE_XSS.NASL Type nessus Reporter This script is Copyright (C) 2005-2021 Tenable Network Security, Inc. Modified 2005-02-08T00:00:00
Description
The remote version of Claroline fails to sanitize user input to
several parameters of the 'add_course.php' script. Using a
specially crafted URL, an attacker may be able to exploit this issue
to perform cross-site scripting attacks against users of the affected
application.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if(description)
{
script_id(16318);
script_version("1.18");
script_bugtraq_id(12449);
script_name(english:"Claroline add_course.php Multiple Parameter XSS");
script_set_attribute(attribute:"synopsis", value:
"The remote host contains a PHP script that is prone to cross-site
scipting attacks." );
script_set_attribute(attribute:"description", value:
"The remote version of Claroline fails to sanitize user input to
several parameters of the 'add_course.php' script. Using a
specially crafted URL, an attacker may be able to exploit this issue
to perform cross-site scripting attacks against users of the affected
application." );
script_set_attribute(attribute:"see_also", value:"https://secuniaresearch.flexerasoftware.com/advisories/14131/" );
script_set_attribute(attribute:"solution", value:
"Upgrade as necessary to Claroline 1.5.3 and apply the
claroline153fix01.zip patch referenced in the advisory above." );
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
script_set_attribute(attribute:"exploit_available", value:"true");
script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
script_set_attribute(attribute:"plugin_publication_date", value: "2005/02/08");
script_set_attribute(attribute:"vuln_publication_date", value: "2005/02/04");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();
script_summary(english:"Checks if Claroline is vulnerable to a XSS attack");
script_category(ACT_ATTACK);
script_copyright(english:"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.");
script_family(english:"CGI abuses : XSS");
script_dependencie("claroline_detect.nasl", "cross_site_scripting.nasl");
script_exclude_keys("Settings/disable_cgi_scanning");
script_require_ports("Services/www", 80);
script_require_keys("www/claroline");
exit(0);
}
#
# The script code starts here
#
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:80);
if ( get_kb_item("www/" + port + "/generic_xss") ) exit(0);
# Test an install.
install = get_kb_item(string("www/", port, "/claroline"));
if (isnull(install)) exit(0);
matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");
if (isnull(matches)) exit(0);
dir = matches[2];
r = http_send_recv3(method:"GET", item:dir + "/add_course.php?intitule=<script>foo<script>", port:port);
if (isnull(r)) exit(0);
if( "/create_course/add_course.php?intitule=<script>foo</script>>" >< r[2] )
{
security_warning(port);
set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
}
{"id": "CLAROLINE_XSS.NASL", "bulletinFamily": "scanner", "title": "Claroline add_course.php Multiple Parameter XSS", "description": "The remote version of Claroline fails to sanitize user input to\nseveral parameters of the 'add_course.php' script. Using a\nspecially crafted URL, an attacker may be able to exploit this issue\nto perform cross-site scripting attacks against users of the affected\napplication.", "published": "2005-02-08T00:00:00", "modified": "2005-02-08T00:00:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "href": "https://www.tenable.com/plugins/nessus/16318", "reporter": "This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.", "references": ["https://secuniaresearch.flexerasoftware.com/advisories/14131/"], "cvelist": [], "type": "nessus", "lastseen": "2021-01-20T09:38:14", "edition": 24, "viewCount": 2, "enchantments": {"dependencies": {"references": [], "modified": "2021-01-20T09:38:14", "rev": 2}, "score": {"value": -0.6, "vector": "NONE", "modified": "2021-01-20T09:38:14", "rev": 2}, "vulnersScore": -0.6}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif(description)\n{\n script_id(16318);\n script_version(\"1.18\");\n script_bugtraq_id(12449);\n \n script_name(english:\"Claroline add_course.php Multiple Parameter XSS\");\n \n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host contains a PHP script that is prone to cross-site\nscipting attacks.\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote version of Claroline fails to sanitize user input to\nseveral parameters of the 'add_course.php' script. Using a\nspecially crafted URL, an attacker may be able to exploit this issue\nto perform cross-site scripting attacks against users of the affected\napplication.\" );\n script_set_attribute(attribute:\"see_also\", value:\"https://secuniaresearch.flexerasoftware.com/advisories/14131/\" );\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade as necessary to Claroline 1.5.3 and apply the\nclaroline153fix01.zip patch referenced in the advisory above.\" );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2005/02/08\");\n script_set_attribute(attribute:\"vuln_publication_date\", value: \"2005/02/04\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\nscript_set_attribute(attribute:\"plugin_type\", value:\"remote\");\nscript_end_attributes();\n\n script_summary(english:\"Checks if Claroline is vulnerable to a XSS attack\");\n script_category(ACT_ATTACK);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.\");\n script_family(english:\"CGI abuses : XSS\");\n script_dependencie(\"claroline_detect.nasl\", \"cross_site_scripting.nasl\");\n script_exclude_keys(\"Settings/disable_cgi_scanning\");\n script_require_ports(\"Services/www\", 80);\n script_require_keys(\"www/claroline\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\n\nport = get_http_port(default:80);\n\nif ( get_kb_item(\"www/\" + port + \"/generic_xss\") ) exit(0);\n\n# Test an install.\ninstall = get_kb_item(string(\"www/\", port, \"/claroline\"));\nif (isnull(install)) exit(0);\n\nmatches = eregmatch(string:install, pattern:\"^(.+) under (/.*)$\");\nif (isnull(matches)) exit(0);\n\ndir = matches[2];\nr = http_send_recv3(method:\"GET\", item:dir + \"/add_course.php?intitule=<script>foo<script>\", port:port);\nif (isnull(r)) exit(0);\n\nif( \"/create_course/add_course.php?intitule=<script>foo</script>>\" >< r[2] )\n {\n security_warning(port);\n set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);\n }\n \n", "naslFamily": "CGI abuses : XSS", "pluginID": "16318", "cpe": [], "scheme": null}