How to Buy
This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
A web application hosted on the remote web server has a cross-site
The version of WebShield UI hosted on the remote web server has a
reflected cross-site scripting vulnerability. Input to the 'bodyStyle'
parameter of ProcessTextFiles is not properly sanitized.
A remote attacker could exploit this by tricking a user into requesting
a maliciously crafted URL, resulting in arbitrary script code execution.
This application has several other vulnerabilities, though Nessus has
not checked for those issues.
See also :
Apply the relevant patch specified in the McAfee advisory.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.2
Public Exploit Available : false
Family: CGI abuses : XSS
Nessus Plugin ID: 58582 ()
Bugtraq ID: 52487
CVE ID: CVE-2012-4580
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.