Fusebox index.cfm fuseaction Parameter XSS

medium Nessus Plugin ID 19383

Synopsis

The remote web server contains an application that is vulnerable to a cross-site scripting attack.

Description

The remote host is running Fusebox, a framework for building web-based applications in Cold Fusion and PHP.

The installed web application appears to have been created using Fusebox in such a way that it fails to sanitize user-supplied input to the 'fuseaction' parameter before using it in dynamically-generated webpages.

Note that this flaw may not be specific to the Fusebox framework, per se, but instead be an implementation issue since Fusebox itself does not generate any HTML, but lets the developer control all output.

Solution

Unknown at this time.

See Also

https://seclists.org/bugtraq/2005/Aug/42

https://seclists.org/bugtraq/2005/Aug/133

Plugin Details

Severity: Medium

ID: 19383

File Name: fusebox_fuseaction_xss.nasl

Version: 1.29

Type: remote

Published: 8/4/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:fusebox:fusebox

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 8/3/2005

Reference Information

CVE: CVE-2005-2480

BID: 14460

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990