Guppy Multiple HTTP Header XSS

(C) 2005-2014 Josh Zlatin-Amishav


Synopsis :

The remote web server contains a PHP script that allows for
arbitrary code execution and cross-site scripting attacks.

Description :

The remote host is running Guppy, a CMS written in PHP.

The remote version of this software does not properly sanitize input
to the Referer and User-Agent HTTP headers before using it in the
'error.php' script. A malicious user can exploit this flaw to inject
arbitrary script and HTML code into a user's browser or, if PHP's
'magic_quotes_gpc' seting is disabled, PHP code to be executed on the
remote host subject to the privileges of the web server user id.

See also :

http://www.vupen.com/english/advisories/2005/1639

Solution :

Upgrade to Guppy version 4.5.4 or later.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 19943 (guppy_request_header_flaws.nasl)

Bugtraq ID: 14753

CVE ID: CVE-2005-2853