LogAnalyzer index.php filter Parameter XSS

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The remote web server hosts a PHP script that is affected by a
cross-site scripting vulnerability.

Description :

The LogAnalyzer install hosted on the remote web server is affected by
a cross-site scripting vulnerability because it fails to properly
sanitize user input to the 'filter' parameter of the 'index.php' script.
An attacker may be able to leverage this to inject arbitrary HTML and
script code into a user's browser to be executed within the security
context of the affected site.

The application is reportedly also affected by a SQL injection
vulnerability, an arbitrary file read vulnerability, and additional
cross-site scripting vulnerabilities, but Nessus has not tested for
these additional vulnerabilities.

See also :

http://www.nessus.org/u?9f9d105f
http://www.nessus.org/u?6da2d063
http://www.nessus.org/u?07a25948

Solution :

Upgrade to version 3.4.3 / 3.5.4 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 62123 ()

Bugtraq ID: 53664

CVE ID: