Sawmill < 7.1.14 GET Request Query String XSS

This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.


Synopsis :

The remote web server suffers from a cross-site scripting
vulnerability.

Description :

The remote host is running Sawmill, a weblog analysis package.

The version of Sawmill installed on the remote host suffers from a
cross-site scripting flaw because its standalone web server treats an
arbitrary query string appended to a GET request as a configuration
command and fails to sanitize it before using it in an error page. An
unauthenticated attacker may be able to exploit this issue to steal
authentication information of users of the affected application.

See also :

http://www.nta-monitor.com/news/xss/sawmill/index.htm
http://archives.neohapsis.com/archives/bugtraq/2005-09/0114.html

Solution :

Upgrade to Sawmill 7.1.14 or later or use Sawmill in CGI mode.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 19681 ()

Bugtraq ID: 14789

CVE ID: CVE-2005-2950