ProjectPier index.php Multiple Parameter XSS

This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.


Synopsis :

The remote web server contains a PHP application that is affected by
cross-site scripting vulnerabilities.

Description :

The remote host is running ProjectPier, an open source project
management tool written in PHP.

The version of ProjectPier installed on the remote host fails to
sanitize user input to the 'ref_c' and 'ref_a' parameters of the
'index.php' script before using it to generate dynamic HTML output.
An unauthenticated attacker can exploit this to inject arbitrary HTML
and script code into a user's browser to be executed within the
security context of the affected site.

Note that there are also reportedly several other vulnerabilities
associated with this version of ProjectPier, although Nessus has not
checked for them.

See also :

http://www.securityfocus.com/archive/1/488294
http://www.projectpier.org/node/679

Solution :

Upgrade to ProjectPier 0.8.0.1 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 31117 ()

Bugtraq ID: 27857

CVE ID: CVE-2008-5584