Korean
<< Back
VID 21427
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The FAQ-O-Matic has a 'fom.cgi' Cross-site Scripting Vulnerability.
FAQ-O-Matic is an open-source CGI-based program used to maintain a FAQ (Frequently Asked Questions) page on a Web site. FAQ-O-Matic 2.711, 2.712 are vulnerable to cross-site scripting vulnerability, caused by a failure of the application to properly validate user-supplied input in the 'fom.cgi' script. A remote attacker could create a specially crafted URL link to the 'fom.cgi' script containing malicious script code in 'cmd=' parameter, and then could persuade a target user to click it. Once the URL is clicked, the embedded codes would be executed in the victim's Web browser. A remote attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

* References:
http://securitytracker.com/alerts/2002/Feb/1003476.html
http://www.osvdb.org/displayvuln.php?osvdb_id=8661

* Platforms Affected:
Jon Howell, FAQ-O-Matic 2.711, 2.712
Debian Linux 2.2
Recommendation Apply the fix for this vulnerability, available from the SourceForge.net Web site at http://sourceforge.net/projects/faqomatic

For Debian GNU/Linux 2.2 (potato):
Upgrade to the latest version of faqomatic (2.603-1.2 or later), as listed in Debian Security Advisory DSA-109-1 at http://www.debian.org/security/2002/dsa-109

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2002-0230 (CVE)
Related URL 4565 (SecurityFocus)
Related URL 8066 (ISS)