VID |
21792 |
Severity |
30 |
Port |
19638 |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The WEBppliance program is vulnerable to a cross-site scripting vulnerability via the ocw_login_username parameter. WEBppliance is a Web hosting program for Microsoft Windows and Linux-based operating systems. WEBppliance versions 3.0, 3.1 and 3.1.1 are vulnerable to a cross-site scripting attack, caused by improper validation of user-supplied input passed to the ocw_login_username parameter of the login script. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* References: http://membres.lycos.fr/newnst/exploit/Ensim_Autentification_XSS_By_ConcorDHacK.html http://www.zataz.com/forum/viewtopic.php?id=113
* Platforms Affected: Ensim WEBppliance versions 3.0, 3.1 and 3.1.1 Microsoft Windows Any version Linux Any version |
Recommendation |
No upgrade or patch available as of December 2005.
Upgrade to the latest version of WEBppliance, when new fixed version becomes available from the WEBppliance Download FTP site at ftp://ftp.ensim.com/download/webppliance/ |
Related URL |
CVE-2005-3014 (CVE) |
Related URL |
14836 (SecurityFocus) |
Related URL |
(ISS) |
|