MS06-017: FrontPage fpadmdll.dll Multiple Parameter XSS (917627)

This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.


Synopsis :

The remote web server contains a server extension that is affected by
several cross-site scripting flaws.

Description :

The version of Microsoft FrontPage Server Extensions 2002 / SharePoint
Team Services on the remote host fails to sanitize user-supplied input
to the 'operation', 'command', and 'name' parameters of
'/_vti_bin/_vti_adm/fpadmdll.dll' before using it to generate dynamic
HTML. An attacker may be able to exploit this issue to cause arbitrary
HTML and script code to be executed by a user's browser in the context
of the affected website. If the user is an administrator, successful
exploitation will give the attacker complete control over the affected
application.

See also :

http://technet.microsoft.com/en-us/security/bulletin/ms06-017

Solution :

Microsoft has released a set of patches for Frontapage 2002 for XP and
2003.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 21247 (frontpage_fpadmdll_xss.nasl)

Bugtraq ID: 17452

CVE ID: CVE-2006-0015