VID |
22378 |
Severity |
30 |
Port |
8080,9090 |
Protocol |
TCP |
Class |
Webproxy |
Detailed Description |
The WebWasher Classic, according to its banner, has multiple cross-site scripting vulnerabilities. WebWasher Classic is a well known HTTP-URL/Popup/Script filtering proxy server. WebWasher CSM versions prior to 4.4.1 Build 1613 are vulnerable to multiple cross-site scripting vulnerabilities. These vulnerabilities could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* Note: This check solely relied on the banner of WebWasher Classic server to assess this vulnerability, so this might be a false positive.
* References: http://www.oliverkarow.de/research/WebWasherXSS.txt http://www.oliverkarow.de/research/wwcsm.txt http://archives.neohapsis.com/archives/bugtraq/2003-11/0157.html http://secunia.com/advisories/14801/
* Platforms Affected: WebWasher CSM versions prior to 4.4.1 Build 1613 Any operating system Any version |
Recommendation |
Upgrade to the latest version of WebWasher CSM (4.4.1 Build 1613 or later), available from: http://download.cnet.com/Webwasher/3000-2144_4-10048781.html |
Related URL |
(CVE) |
Related URL |
9039,13037 (SecurityFocus) |
Related URL |
13756,20017 (ISS) |
|