Plesk Reloaded login_up.php3 login_name Parameter XSS

This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.

Synopsis :

The remote web server contains a PHP script that is affected by a
cross-site scripting vulnerability.

Description :

The remote host is running Plesk Reloaded (from SWsoft), a web-based
system administration tool.

The remote version of this software is vulnerable to a cross-site
scripting attack because of its failure to sanitize user input to the
'login_name' parameter of the 'login_up.php3' script. This issue can
be used to take advantage of the trust between a client and server
allowing the malicious user to execute malicious JavaScript on the
client's machine.

See also :

Solution :

Reportedly the vendor has issued patches, which are available via its
website or the software's autoupdate feature.

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 4.3
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 14369 ()

Bugtraq ID: 11024

CVE ID: CVE-2004-2702

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now