OpenAdmin Tool for Informix informixserver Parameter XSS

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

The remote web server hosts a PHP script that is prone to a cross-
site scripting attack.

Description :

The instance of OpenAdmin Tool for Informix hosted on the remote web
server fails to sanitize user input to the 'informixserver' parameter
of its 'index.php' script before using it to generate dynamic HTML
output.

An attacker may be able to leverage this issue to inject arbitrary
HTML or script code into a user's browser to be executed within the
security context of the affected site.

Note that this script is likely affected by other cross-site scripting
issues involving the 'host' and 'port' parameters as well, although
Nessus has not checked for them.

See also :

http://voidroot.blogspot.com/2011/08/xss-in-ibm-open-admin-tool.html
http://archives.neohapsis.com/archives/bugtraq/2011-08/0204.html

Solution :

Upgrade to OpenAdmin Tool version 2.72 or later as that reportedly
fixes the vulnerability.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 56172 ()

Bugtraq ID: 49364

CVE ID: CVE-2011-3390