Korean
<< Back
VID 21448
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The ViewCVS software has a 'viewcvs.cgi' Cross-site Scripting Vulnerability.
ViewCVS is a Web browser interface written in the Python programming language for CVS and Subversion version control repositories. ViewCVS versions 0.9.2 and earlier are vulnerable to cross-site scripting vulnerability, caused by a failure of the application to properly validate user-supplied input in the 'viewcvs.cgi' script. A remote attacker could create a specially crafted URL link to the 'viewcvs.cgi' script containing malicious script code in 'cvsroot' or 'sortby' parameter, and then could persuade a target user to click it. Once the URL is clicked, the embedded codes would be executed in the victim's Web browser. A remote attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

* References:
http://securitytracker.com/alerts/2002/May/1004328.html

* Platforms Affected:
Greg Stein, ViewCVS 0.9.2 and earlier
Linux Any version
Unix Any version
Microsoft Windows Any version
Recommendation Apply one of the patches for this vulnerability included in the BugTraq Mailing List posting dated May 19 2002 12:32AM at http://archives.neohapsis.com/archives/bugtraq/2002-05/0161.html
Related URL CVE-2002-0771 (CVE)
Related URL 4818 (SecurityFocus)
Related URL 9112 (ISS)