BASE < 1.4.3 XSS

high Nessus Network Monitor Plugin ID 5033

Synopsis

The remote host is vulnerable to an HTML Injection attack

Description

The remote host is running BASE, a web-based tool for analyzing alerts from one or more SNORT sensors. The version of BASE installed on the remote host allows a remote attacker to inject HTML and perform cross-site scripting (XSS) attacks against unsuspecting users. In order to inject the malicious code, the attacker would need the ability to log into the BASE system. Successful exploitation would result in the attacker executing script code within the browser of other BASE users. The two php scripts which are vulnerable to injection are: 'base_ag_main.php' and 'base_qry_main.php'.

Solution

Upgrade to BASE version 1.4.3 or later.

See Also

http://spl0it.org/blog/index.php?entry=entry090522-185228

Plugin Details

Severity: High

ID: 5033

Family: CGI

Published: 8/18/2004

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Reference Information

BID: 35086