SAP DB / MaxDB WebDBM Multiple Parameter XSS

This script is Copyright (C) 2009-2012 Tenable Network Security, Inc.


Synopsis :

The remote web server contains a script that is affected by multiple
cross-site scripting vulnerabilities.

Description :

The remote web server contains the WebDBM script, a component of SAP
DB / MaxDB.

The version of this script found on the remote host fails to sanitize
user-supplied input to its 'Database', 'User', and 'Password' parameters
before using it to generate dynamic content. An unauthenticated, remote
attacker may be able to leverage this issue to inject arbitrary HTML or
script code into a user's browser to be executed within the security
context of the affected site.

See also :

http://www.securityfocus.com/archive/1/502318/30/0/threaded

Solution :

The vendor reportedly recommends replacing WebDBM with 'Database
Studio'.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 36072 ()

Bugtraq ID: 34319

CVE ID: