Pubcookie Login Server index.cgi XSS

medium Nessus Plugin ID 21158

Synopsis

The remote web server contains a CGI script that is affected by several non-persistent, cross-site scripting flaws.

Description

The remote host is running Pubcookie, an open source package for intra-institutional, single-sign-on, end-user web authentication.

The version of the Login Server component of Pubcookie installed on the remote host fails to sanitize user-supplied input to various parameters of the 'index.cgi' script before using it to generate dynamic HTML. An attacker may be able to exploit these issues to cause arbitrary HTML and script code to be executed by a user's browser in the context of the affected website, which could be used to steal authentication credentials or mis-represent the affected application.

Solution

Upgrade to Pubcookie version 3.2.1b / 3.3.0a or later.

See Also

http://pubcookie.org/news/20060306-login-secadv.html

Plugin Details

Severity: Medium

ID: 21158

File Name: pubcookie_xss.nasl

Version: 1.22

Type: remote

Published: 3/28/2006

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:university_of_washington:pubcookie

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 3/6/2006

Reference Information

CVE: CVE-2006-1392

BID: 17221

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990