Lucene search

K
nessusThis script is Copyright (C) 2004-2021 Tenable Network Security, Inc.XOOPS_DICTIONARY_XSS.NASL
HistorySep 01, 2004 - 12:00 a.m.

XOOPS <= 1.0 Dictionary Module Multiple Scripts XSS

2004-09-0100:00:00
This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.
www.tenable.com
11

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

82.1%

The remote version of XOOPS is vulnerable to several cross-site scripting attacks. An attacker can exploit it using the ‘terme’ and ‘letter’ parameters of the ‘search.php’ and ‘letter.php’ scripts respectively. This can be used to take advantage of the trust between a client and server allowing the malicious user to execute malicious JavaScript on the client’s machine.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#


include('deprecated_nasl_level.inc');
include('compat.inc');

if(description)
{
 script_id(14614);
 script_version("1.23");

 script_cve_id("CVE-2004-1640");
 script_bugtraq_id(11064);
 
 script_name(english:"XOOPS <= 1.0 Dictionary Module Multiple Scripts XSS");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains PHP scripts that are affected by cross-
site scripting flaws." );
 script_set_attribute(attribute:"description", value:
"The remote version of XOOPS is vulnerable to several cross-site
scripting attacks.  An attacker can exploit it using the 'terme' and
'letter' parameters of the 'search.php' and 'letter.php' scripts
respectively.  This can be used to take advantage of the trust between
a client and server allowing the malicious user to execute malicious
JavaScript on the client's machine." );
 script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bugtraq&m=109394077209963&w=2" );
 script_set_attribute(attribute:"solution", value:
"Unknown at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/09/01");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/08/28");
 script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 script_summary(english:"Checks for the presence of an XSS bug in XOOPS");
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses : XSS");
 script_dependencie("xoops_detect.nasl", "cross_site_scripting.nasl");
 script_require_ports("Services/www", 80);
 script_require_keys("www/xoops");
 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

if(!can_host_php(port:port))exit(0);
if (  get_kb_item(string("www/", port, "/generic_xss")) ) exit(0);

# Test an install.
install = get_kb_item(string("www/", port, "/xoops"));
if (isnull(install)) exit(0);
matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");
if (!isnull(matches)) {
 loc = matches[2];

 r = http_send_recv3(method: "GET", item:string(loc, "/letter.php?<script>foo</script>"), port:port);

 if (isnull(r)) exit(0);
 if('<script>foo</script>' >< r[2] )
 {
 	security_warning(port);
	set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
	exit(0);
 }
}

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

82.1%

Related for XOOPS_DICTIONARY_XSS.NASL