Lucene search

K
nessusThis script is Copyright (C) 2005-2021 Tenable Network Security, Inc.PAYPROCART_XSS.NASL
HistoryApr 07, 2005 - 12:00 a.m.

ProfitCode PayProCart usrdetails.php sgnuptype Parameter XSS

2005-04-0700:00:00
This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.
www.tenable.com
35

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.003

Percentile

70.3%

The remote host is running PayProCart, a shopping cart software program written in PHP. The remote version of this software contains an input validation flaw in the file ‘usrdetails.php’ that could allow an attacker to use the remote host to perform a cross-site scripting attack.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if(description)
{
 script_id(17996);
 script_version("1.16");
 script_cve_id("CVE-2005-1004");
 script_bugtraq_id(13002);

 script_name(english:"ProfitCode PayProCart usrdetails.php sgnuptype Parameter XSS");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote host has an application that is affected by a 
cross-site scripting vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote host is running PayProCart, a shopping cart 
software program written in PHP. The remote version of this software
contains an input validation flaw in the file 
'usrdetails.php' that could allow an attacker to use the remote
host to perform a cross-site scripting attack." );
 script_set_attribute(attribute:"solution", value:
"Upgrade to the newest version of this software." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/04/07");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/04/04");
 script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 script_summary(english:"Checks PayProCart");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses : XSS");
 script_dependencie("http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("www/PHP");
 exit(0);
}

# Check starts here

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

if ( ! can_host_php(port:port) )
 exit(1, "The remote Web Server on port "+port+" does not support PHP.");

foreach dir (make_list( cgi_dirs()))
{
 res = http_send_recv3(port:port, method:"GET", item:dir + "/usrdetails.php?sgnuptype=csaleID<script>nessus</script>", exit_on_fail: 1);

 if('<input type="hidden" name="sgnuptype" value="csaleID<script>nessus</script>' >< res[2] )
  {
   security_warning(port);
   set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
   exit(0);
  }
}

exit(0, "usrdetails.php was not found on port "+port+" or is not vulnerable.");

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.003

Percentile

70.3%

Related for PAYPROCART_XSS.NASL