ID OPENVAS:136141256231011441 Type openvas Reporter This script is Copyright (C) 2003 k-otik.com Modified 2018-12-18T00:00:00
Description
An attacker may use the installed version of Mambo Site Server to
perform a cross site scripting attack on this host.
# OpenVAS Vulnerability Test
# $Id: mambo_xss.nasl 12818 2018-12-18 09:55:03Z ckuersteiner $
# Description: Mambo Site Server 4.0.10 XSS
#
# Authors:
# K-Otik.com <ReYn0@k-otik.com>
# Updated: 04/07/2009
# Antu Sanadi <santu@secpod.com>
#
# Copyright:
# Copyright (C) 2003 k-otik.com
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
CPE = "cpe:/a:mambo-foundation:mambo";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.11441");
script_version("$Revision: 12818 $");
script_tag(name:"last_modification", value:"$Date: 2018-12-18 10:55:03 +0100 (Tue, 18 Dec 2018) $");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_cve_id("CVE-2003-1203");
script_bugtraq_id(7135);
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_name("Mambo Site Server 4.0.10 XSS");
script_category(ACT_ATTACK);
script_tag(name:"qod_type", value:"remote_analysis");
script_family("Web application abuses");
script_copyright("This script is Copyright (C) 2003 k-otik.com");
script_dependencies("mambo_detect.nasl", "cross_site_scripting.nasl");
script_mandatory_keys("mambo_cms/detected");
script_require_ports("Services/www", 80);
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"solution", value:"Upgrade to a newer version.");
script_tag(name:"summary", value:"An attacker may use the installed version of Mambo Site Server to
perform a cross site scripting attack on this host.");
exit(0);
}
include("host_details.inc");
include("http_func.inc");
include("http_keepalive.inc");
if (!port = get_app_port(cpe: CPE))
exit(0);
if (!dir = get_app_location(cpe: CPE, port: port))
exit(0);
if (dir == "/")
dir = "";
url = dir + "/index.php?option=search&searchword=<script>alert(document.cookie);</script>";
req = http_get(item:url, port:port);
resp = http_keepalive_send_recv(port:port, data:req);
if(!resp)
exit(0);
if(resp =~ "HTTP/1\.. 200" && "<script>alert(document.cookie);</script>" >< resp) {
security_message(port);
exit(0);
}
exit(99);
{"id": "OPENVAS:136141256231011441", "type": "openvas", "bulletinFamily": "scanner", "title": "Mambo Site Server 4.0.10 XSS", "description": "An attacker may use the installed version of Mambo Site Server to\n perform a cross site scripting attack on this host.", "published": "2005-11-03T00:00:00", "modified": "2018-12-18T00:00:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "href": "http://plugins.openvas.org/nasl.php?oid=136141256231011441", "reporter": "This script is Copyright (C) 2003 k-otik.com", "references": [], "cvelist": ["CVE-2003-1203"], "lastseen": "2019-05-29T18:31:58", "viewCount": 9, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2003-1203"]}, {"type": "osvdb", "idList": ["OSVDB:7493"]}, {"type": "openvas", "idList": ["OPENVAS:11441"]}, {"type": "exploitdb", "idList": ["EDB-ID:22382"]}, {"type": "nessus", "idList": ["MAMBO_XSS.NASL"]}], "modified": "2019-05-29T18:31:58", "rev": 2}, "score": {"value": 4.1, "vector": "NONE", "modified": "2019-05-29T18:31:58", "rev": 2}, "vulnersScore": 4.1}, "pluginID": "136141256231011441", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mambo_xss.nasl 12818 2018-12-18 09:55:03Z ckuersteiner $\n# Description: Mambo Site Server 4.0.10 XSS\n#\n# Authors:\n# K-Otik.com <ReYn0@k-otik.com>\n# Updated: 04/07/2009\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2003 k-otik.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nCPE = \"cpe:/a:mambo-foundation:mambo\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.11441\");\n script_version(\"$Revision: 12818 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-12-18 10:55:03 +0100 (Tue, 18 Dec 2018) $\");\n script_tag(name:\"creation_date\", value:\"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)\");\n script_cve_id(\"CVE-2003-1203\");\n script_bugtraq_id(7135);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n\n script_name(\"Mambo Site Server 4.0.10 XSS\");\n\n script_category(ACT_ATTACK);\n script_tag(name:\"qod_type\", value:\"remote_analysis\");\n script_family(\"Web application abuses\");\n script_copyright(\"This script is Copyright (C) 2003 k-otik.com\");\n script_dependencies(\"mambo_detect.nasl\", \"cross_site_scripting.nasl\");\n script_mandatory_keys(\"mambo_cms/detected\");\n script_require_ports(\"Services/www\", 80);\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"solution\", value:\"Upgrade to a newer version.\");\n\n script_tag(name:\"summary\", value:\"An attacker may use the installed version of Mambo Site Server to\n perform a cross site scripting attack on this host.\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"http_func.inc\");\ninclude(\"http_keepalive.inc\");\n\nif (!port = get_app_port(cpe: CPE))\n exit(0);\n\nif (!dir = get_app_location(cpe: CPE, port: port))\n exit(0);\n\nif (dir == \"/\")\n dir = \"\";\n\nurl = dir + \"/index.php?option=search&searchword=<script>alert(document.cookie);</script>\";\nreq = http_get(item:url, port:port);\nresp = http_keepalive_send_recv(port:port, data:req);\n\nif(!resp)\n exit(0);\n\nif(resp =~ \"HTTP/1\\.. 200\" && \"<script>alert(document.cookie);</script>\" >< resp) {\n security_message(port);\n exit(0);\n}\n\nexit(99);\n", "naslFamily": "Web application abuses", "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T05:22:10", "description": "Cross-site scripting (XSS) vulnerability in index.php for Mambo Site Server 4.0.10 allows remote attackers to execute script on other clients via the ?option parameter.", "edition": 4, "cvss3": {}, "published": "2003-03-18T05:00:00", "title": "CVE-2003-1203", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2003-1203"], "modified": "2017-07-11T01:29:00", "cpe": ["cpe:/a:mambo:mambo_site_server:4.0.10"], "id": "CVE-2003-1203", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-1203", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:mambo:mambo_site_server:4.0.10:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:02", "bulletinFamily": "software", "cvelist": ["CVE-2003-1203"], "edition": 1, "description": "## Vulnerability Description\nMambo contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'option' variables upon submission to the 'index.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nMambo contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'option' variables upon submission to the 'index.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[victim]/index.php?option=search&searchword=<script>alert(document.cookie);</script>\n## References:\nVendor URL: http://www.mamboserver.com/\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2003-03/0275.html\nISS X-Force ID: 11601\n[CVE-2003-1203](https://vulners.com/cve/CVE-2003-1203)\nBugtraq ID: 7135\n", "modified": "2003-03-18T00:00:00", "published": "2003-03-18T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:7493", "id": "OSVDB:7493", "title": "Mambo Open Source index.php option Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "openvas": [{"lastseen": "2018-03-13T11:47:16", "bulletinFamily": "scanner", "cvelist": ["CVE-2003-1203"], "description": "An attacker may use the installed version of Mambo Site Server to\n perform a cross site scripting attack on this host.", "modified": "2018-03-12T00:00:00", "published": "2005-11-03T00:00:00", "id": "OPENVAS:11441", "href": "http://plugins.openvas.org/nasl.php?oid=11441", "type": "openvas", "title": "Mambo Site Server 4.0.10 XSS", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mambo_xss.nasl 9087 2018-03-12 17:24:24Z cfischer $\n# Description: Mambo Site Server 4.0.10 XSS\n#\n# Authors:\n# K-Otik.com <ReYn0@k-otik.com>\n# Updated: 04/07/2009\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2003 k-otik.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ntag_summary = \"An attacker may use the installed version of Mambo Site Server to\n perform a cross site scripting attack on this host.\";\n\ntag_solution = \"Upgrade to a newer version.\";\n\n# Message-ID: <1642444765.20030319015935@olympos.org>\n# From: Ertan Kurt <ertank@olympos.org>\n# To: <bugtraq@securityfocus.com>\n# Subject: Some XSS vulns </archive/1/315554/2003-03-19/2003-03-25/1>\n\nif(description)\n{\n script_id(11441);\n script_version(\"$Revision: 9087 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-03-12 18:24:24 +0100 (Mon, 12 Mar 2018) $\");\n script_tag(name:\"creation_date\", value:\"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)\");\n script_cve_id(\"CVE-2003-1203\");\n script_bugtraq_id(7135);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_name(\"Mambo Site Server 4.0.10 XSS\");\n\n script_category(ACT_ATTACK);\n script_tag(name:\"qod_type\", value:\"remote_vul\");\n script_family(\"Web application abuses\");\n script_copyright(\"This script is Copyright (C) 2003 k-otik.com\");\n script_dependencies(\"mambo_detect.nasl\", \"cross_site_scripting.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\n\ninclude(\"http_func.inc\");\ninclude(\"http_keepalive.inc\");\n\nport = get_http_port(default:80);\n\nif(!get_port_state(port)){\n exit(0);\n}\n\nversion=get_kb_item(string(\"www/\", port, \"/mambo_mos\"));\nif(!version){\n exit(0);\n}\n\nmatches = eregmatch(string:version, pattern:\"^(.+) under (/.*)$\");\nif(!imatches){\n exit(0);\n}\n\ndir = matches[2];\nurl = string(dir, \"/index.php?option=search&searchword=<script>alert(document.cookie);</script>\");\nreq = http_get(item:url, port:port);\nresp = http_keepalive_send_recv(port:port, data:req);\nif(!resp){\n exit(0);\n}\n\nif(resp =~ \"HTTP/1\\.. 200\" && \"<script>alert(document.cookie);</script>\" >< resp)\n security_message(port);\n\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "exploitdb": [{"lastseen": "2016-02-02T18:37:27", "description": "Mambo Site Server 4.0.10 index.php Cross Site Scripting Vulnerability. CVE-2003-1203. Webapps exploit for php platform", "published": "2003-03-18T00:00:00", "type": "exploitdb", "title": "Mambo Site Server 4.0.10 index.php Cross-Site Scripting Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2003-1203"], "modified": "2003-03-18T00:00:00", "id": "EDB-ID:22382", "href": "https://www.exploit-db.com/exploits/22382/", "sourceData": "source: http://www.securityfocus.com/bid/7135/info\r\n\r\nMambo Site Server has been reported prone to a cross-site scripting vulnerability.\r\n\r\nIt has been reported that certain user supplied URI parameters are not sufficiently sanitized by the Mambo Site Server. As a result of this deficiency an attacker may create a specially crafted URL that includes malicious HTML code passed to the index page used by Mambo Site server. \r\n\r\nThis may allow for theft of cookie-based authentication credentials and other attacks.\r\n\r\nThis vulnerability was reported to affect Mambo Site Server version 4.0.10 it is not currently known if other versions are affected.\r\n\r\nhttp://www.example.com/index.php?option=search&searchword=<script>alert(document.cookie);</script>", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/22382/"}], "nessus": [{"lastseen": "2021-01-20T12:02:12", "description": "An attacker may use the installed version of Mambo Site Server to\nperform a cross-site scripting attack on this host.", "edition": 25, "published": "2003-03-22T00:00:00", "title": "Mambo Site Server 4.0.10 XSS", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2003-1203"], "modified": "2003-03-22T00:00:00", "cpe": [], "id": "MAMBO_XSS.NASL", "href": "https://www.tenable.com/plugins/nessus/11441", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# This script was completely rewritten by Tenable Network Security, using a new API\n#\n#\n# Message-ID: <1642444765.20030319015935@olympos.org>\n# From: Ertan Kurt <ertank@olympos.org> \n# To: <bugtraq@securityfocus.com>\n# Subject: Some XSS vulns </archive/1/315554/2003-03-19/2003-03-25/1>\n#\n\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(11441);\n script_cve_id(\"CVE-2003-1203\");\n script_bugtraq_id(7135);\n script_version(\"1.27\");\n\n script_name(english:\"Mambo Site Server 4.0.10 XSS\");\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web server contains a PHP script that is prone to a cross-\nsite scripting attack.\" );\n script_set_attribute(attribute:\"description\", value:\n\"An attacker may use the installed version of Mambo Site Server to\nperform a cross-site scripting attack on this host.\" );\n script_set_attribute(attribute:\"see_also\", value:\"https://www.securityfocus.com/archive/1/315554\" );\n script_set_attribute(attribute:\"solution\", value:\n\"Unknown at this time.\" );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2003/03/22\");\n script_set_attribute(attribute:\"vuln_publication_date\", value: \"2003/03/18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\nscript_set_attribute(attribute:\"plugin_type\", value:\"remote\");\nscript_end_attributes();\n\n script_summary(english:\"Determine if Mambo Site Server is vulnerable to xss attack\");\n script_category(ACT_ATTACK);\n script_family(english:\"CGI abuses : XSS\");\n script_copyright(english:\"This script is Copyright (C) 2003-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_dependencies(\"mambo_detect.nasl\", \"cross_site_scripting.nasl\");\n script_exclude_keys(\"Settings/disable_cgi_scanning\");\n script_require_ports(\"Services/www\", 80);\n script_require_keys(\"www/mambo_mos\");\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\n\nport = get_http_port(default:80);\nif(get_kb_item(string(\"www/\", port, \"/generic_xss\"))) exit(0);\nif(!can_host_php(port:port)) exit(0);\n\n# Test an install.\ninstall = get_kb_item(string(\"www/\", port, \"/mambo_mos\"));\nif (isnull(install)) exit(0);\nmatches = eregmatch(string:install, pattern:\"^(.+) under (/.*)$\");\nif (!isnull(matches)) {\n dir = matches[2];\n test_cgi_xss(port: port, cgi: \"/index.php\", dirs: make_list(dir), \n qs: \"option=search&searchword=<script>alert(document.cookie);</script>\",\n pass_str: \"<script>alert(document.cookie);</script>\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}