paFileDB pafiledb.php id Parameter XSS

medium Nessus Plugin ID 11479

Language:

Synopsis

The remote web server contains a PHP script that is affected by cross- site scripting issues.

Description

The version of paFileDB installed on the remote host is vulnerable to cross-site scripting attacks due to its failure to sanitize input to the 'id' parameter of the 'pafiledb.php' script before using it to generate dynamic HTML. An attacker may use these flaws to steal cookies of users of the affected application.

Solution

Upgrade to paFileDB 3.0 or later.

See Also

https://seclists.org/bugtraq/2002/Oct/310

Plugin Details

Severity: Medium

ID: 11479

File Name: pafiledb_xss.nasl

Version: 1.34

Type: remote

Published: 3/26/2003

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

Required KB Items: www/pafiledb

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 10/20/2002

Reference Information

CVE: CVE-2002-1931, CVE-2005-0952

BID: 6021

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990