Lucene search

K
nessusThis script is Copyright (C) 2003-2021 Tenable Network Security, Inc.LEDNEWS_XSS.NASL
HistoryJun 16, 2003 - 12:00 a.m.

LedNews News Post XSS

2003-06-1600:00:00
This script is Copyright (C) 2003-2021 Tenable Network Security, Inc.
www.tenable.com
9

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.002

Percentile

61.1%

The remote web server is running LedNews, a set of scripts designed to help maintain a news-based website.

There is a flaw in some versions of LedNews that could allow an attacker to include rogue HTML code in the news, which may in turn be used to steal the cookies of people visiting this site, or to annoy them by showing pop-up error messages and such.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
 script_id(11741);
 script_version("1.30");
 script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

 script_cve_id("CVE-2003-0495");
 script_bugtraq_id(7920);

 script_name(english:"LedNews News Post XSS");
 script_summary(english:"Checks for the presence of LedNews");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server is hosting a CGI application that is affected by
a cross-site scripting vulnerability.");
 script_set_attribute(attribute:"description", value:
"The remote web server is running LedNews, a set of scripts designed to
help maintain a news-based website.

There is a flaw in some versions of LedNews that could allow an
attacker to include rogue HTML code in the news, which may in turn be
used to steal the cookies of people visiting this site, or to annoy
them by showing pop-up error messages and such.");
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/vulnwatch/2003/q2/107");
 script_set_attribute(attribute:"solution", value:"There is no known solution at this time.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:U/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"vuln_publication_date", value:"2003/06/15");
 script_set_attribute(attribute:"plugin_publication_date", value:"2003/06/16");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_ATTACK);

 script_copyright(english:"This script is Copyright (C) 2003-2021 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses : XSS");

 script_dependencie("http_version.nasl", "cross_site_scripting.nasl");
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("Settings/ParanoidReport");    
 script_require_ports("Services/www", 80);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_http_port(default:80);
if(get_kb_item(string("www/", port, "/generic_xss"))) exit(0);

function check(loc)
{
 local_var	r;
 r = http_send_recv3(method: "GET", item: strcat(loc, "/"), port:port);
 if (isnull(r)) exit(0);
 if ("<!-- Powered By LedNews: http://www.ledscripts.com -->" >< r[2])
 {
 	security_warning(port);
	set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
	exit(0);
 }
}

foreach dir (cgi_dirs()) check(loc:dir);

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.002

Percentile

61.1%

Related for LEDNEWS_XSS.NASL