ProjectPier index.php Multiple Parameter XSS

This script is Copyright (C) 2008-2017 Tenable Network Security, Inc.


Synopsis :

The remote web server contains a PHP application that is affected by
cross-site scripting vulnerabilities.

Description :

The remote host is running ProjectPier, an open source project
management tool written in PHP.

The version of ProjectPier installed on the remote host fails to
sanitize user input to the 'ref_c' and 'ref_a' parameters of the
'index.php' script before using it to generate dynamic HTML output.
An unauthenticated attacker can exploit this to inject arbitrary HTML
and script code into a user's browser to be executed within the
security context of the affected site.

Note that there are also reportedly several other vulnerabilities
associated with this version of ProjectPier, although Nessus has not
checked for them.

See also :

http://www.securityfocus.com/archive/1/488294
http://www.nessus.org/u?fe0dd32d

Solution :

Upgrade to ProjectPier 0.8.0.1 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 31117 ()

Bugtraq ID: 27857

CVE ID: CVE-2008-5584

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now