Plesk Reloaded login_up.php3 login_name Parameter XSS

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote web server contains a PHP script that is affected by a
cross-site scripting vulnerability.

Description :

The remote host is running Plesk Reloaded (from SWsoft), a web-based
system administration tool.

The remote version of this software is vulnerable to a cross-site
scripting attack because of its failure to sanitize user input to the
'login_name' parameter of the 'login_up.php3' script. This issue can
be used to take advantage of the trust between a client and server
allowing the malicious user to execute malicious JavaScript on the
client's machine.

See also :

http://archives.neohapsis.com/archives/fulldisclosure/2004-08/1022.html

Solution :

Reportedly the vendor has issued patches, which are available via its
website or the software's autoupdate feature.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:H/RL:U/RC:ND)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 14369 ()

Bugtraq ID: 11024

CVE ID: CVE-2004-2702