CGI Generic XSS (persistent)

medium Nessus Plugin ID 42425

Synopsis

A CGI application hosted on the remote web server is potentially prone to cross-site scripting attack.

Description

The remote web server hosts one or more CGI scripts that fail to adequately sanitize request strings containing malicious JavaScript. By leveraging this issue, an attacker may be able to cause arbitrary HTML and script code to be executed in a user's browser within the security context of the affected site.

These issues are likely to be 'persistent' or 'stored', but this aspect should be checked manually. Please note that persistent cross-site scripting can be triggered by any channel that provides information to the application. Nessus cannot test them all.

Solution

Restrict access to the vulnerable application or contact the vendor for a patch or upgrade.

See Also

https://en.wikipedia.org/wiki/Cross_site_scripting#Persistent

http://projects.webappsec.org/w/page/13246920/Cross%20Site%20Scripting

Plugin Details

Severity: Medium

ID: 42425

File Name: torture_cgi_persistent_XSS.nasl

Version: 1.44

Type: remote

Published: 11/6/2009

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

Required KB Items: Settings/enable_web_app_tests

Reference Information

CWE: 116, 20, 442, 692, 712, 722, 725, 74, 751, 79, 80, 801, 81, 811, 83, 86, 928, 931