| VID |
21448 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The ViewCVS software has a 'viewcvs.cgi' Cross-site Scripting Vulnerability. ViewCVS is a Web browser interface written in the Python programming language for CVS and Subversion version control repositories. ViewCVS versions 0.9.2 and earlier are vulnerable to cross-site scripting vulnerability, caused by a failure of the application to properly validate user-supplied input in the 'viewcvs.cgi' script. A remote attacker could create a specially crafted URL link to the 'viewcvs.cgi' script containing malicious script code in 'cvsroot' or 'sortby' parameter, and then could persuade a target user to click it. Once the URL is clicked, the embedded codes would be executed in the victim's Web browser. A remote attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
* References: http://securitytracker.com/alerts/2002/May/1004328.html
* Platforms Affected: Greg Stein, ViewCVS 0.9.2 and earlier Linux Any version Unix Any version Microsoft Windows Any version |
| Recommendation |
Apply one of the patches for this vulnerability included in the BugTraq Mailing List posting dated May 19 2002 12:32AM at http://archives.neohapsis.com/archives/bugtraq/2002-05/0161.html |
| Related URL |
CVE-2002-0771 (CVE) |
| Related URL |
4818 (SecurityFocus) |
| Related URL |
9112 (ISS) |
|