Lucene search

K
openvasCopyright (C) 2004 David MaciejakOPENVAS:136141256231014254
HistoryNov 03, 2005 - 12:00 a.m.

Vulnerability in Exchange Server 5.5 Outlook Web Access XSS (842436)

2005-11-0300:00:00
Copyright (C) 2004 David Maciejak
plugins.openvas.org
7

6.1 Medium

AI Score

Confidence

High

0.962 High

EPSS

Percentile

99.5%

The remote host is running a version of the Outlook Web Access which contains
cross site scripting flaws.

# SPDX-FileCopyrightText: 2004 David Maciejak
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.14254");
  script_version("2023-08-03T05:05:16+0000");
  script_tag(name:"last_modification", value:"2023-08-03 05:05:16 +0000 (Thu, 03 Aug 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_cve_id("CVE-2004-0203");
  script_name("Vulnerability in Exchange Server 5.5 Outlook Web Access XSS (842436)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2004 David Maciejak");
  script_family("Windows : Microsoft Bulletins");
  script_dependencies("secpod_reg_enum.nasl", "find_service.nasl", "httpver.nasl", "webmirror.nasl", "DDI_Directory_Scanner.nasl");
  script_require_ports("Services/www", 80);
  script_mandatory_keys("SMB/registry_enumerated");

  script_tag(name:"impact", value:"This vulnerability could allow an attacker to convince a user
  to run a malicious script. If this malicious script is run, it would execute
  in the security context of the user.
  Attempts to exploit this vulnerability require user interaction.

  This vulnerability could allow an attacker access to any data on the
  Outlook Web Access server that was accessible to the individual user.

  It may also be possible to exploit the vulnerability to manipulate Web browser caches
  and intermediate proxy server caches, and put spoofed content in those caches.");

  script_tag(name:"solution", value:"Apply the Windows Updates described in the references.");

  script_xref(name:"URL", value:"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-026");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/10902");

  script_tag(name:"summary", value:"The remote host is running a version of the Outlook Web Access which contains
  cross site scripting flaws.");

  script_tag(name:"qod_type", value:"registry");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");
include("port_service_func.inc");
include("list_array_func.inc");
include("secpod_reg.inc");

port = http_get_port( default:80 );
if( ! http_can_host_asp( port:port ) ) exit( 0 );

cgi = "/exchange/root.asp";
if( ! http_is_cgi_installed_ka( item:cgi, port:port ) ) exit( 0 );

# now check for the patch
if( hotfix_check_nt_server() <= 0 ) exit( 0 );

vers = hotfix_check_exchange_installed();
if( isnull( vers ) ) exit( 0 );

if( hotfix_missing( name:"KB842436" ) > 0 )
  security_message( port:0 );

6.1 Medium

AI Score

Confidence

High

0.962 High

EPSS

Percentile

99.5%