FireStats window-add-excluded-ip.php 'edit' parameter XSS

This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote web server hosts a web application that is affected by a
cross-site scripting vulnerability.

Description :

The version of FireStats installed on the remote host fails to
properly sanitize user-supplied input to the 'edit' parameter of the
'window-add-excluded-ip.php' script.

An unauthenticated, remote attacker can leverage this issue to execute
arbitrary script code in a user's browser.

Note that this version of FireStats is likely affected by cross-site
scripting issues in multiple other scripts
however, Nessus has not
tested for these.

See also :

http://www.nessus.org/u?caf07989
http://downloads.securityfocus.com/vulnerabilities/exploits/41548.txt
http://firestats.cc/changeset/2191

Solution :

Upgrade to version 1.6.6 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 47746 (firestats_excluded_ip_edit_xss.nasl)

Bugtraq ID: 41548

CVE ID: