ProjectPier index.php Multiple Parameter XSS

medium Nessus Plugin ID 31117

Synopsis

The remote web server contains a PHP application that is affected by cross-site scripting vulnerabilities.

Description

The remote host is running ProjectPier, an open source project management tool written in PHP.

The version of ProjectPier installed on the remote host fails to sanitize user input to the 'ref_c' and 'ref_a' parameters of the 'index.php' script before using it to generate dynamic HTML output. An unauthenticated attacker can exploit this to inject arbitrary HTML and script code into a user's browser to be executed within the security context of the affected site.

Note that there are also reportedly several other vulnerabilities associated with this version of ProjectPier, although Nessus has not checked for them.

Solution

Upgrade to ProjectPier 0.8.0.1 or later.

See Also

https://www.securityfocus.com/archive/1/488294

http://www.nessus.org/u?fe0dd32d

Plugin Details

Severity: Medium

ID: 31117

File Name: projectpier_login_page_xss.nasl

Version: 1.20

Type: remote

Published: 2/19/2008

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:projectpier:projectpier

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Reference Information

CVE: CVE-2008-5584

BID: 27857

CWE: 79