Gossamer Threads Links user.cgi url Parameter XSS

medium Nessus Plugin ID 19234

Synopsis

The remote web server contains a CGI script that is susceptible to a cross-site scripting attack.

Description

The remote host is running Gossamer Links, a web links management tool from Gossamer Threads and written in Perl.

The installed version of Gossamer Links fails to properly sanitize user-supplied input to the 'url' parameter of the 'user.cgi' script. By leveraging this flaw, an attacker may be able to cause arbitrary HTML and script code to be executed by a user's browser within the context of the affected application, leading to cookie theft and similar attacks.

Solution

Upgrade to Gossamer Links 3.0.1 or later.

See Also

http://marc.info/?l=bugtraq&m=111531023916998&w=2

http://www.nessus.org/u?6657cd07

Plugin Details

Severity: Medium

ID: 19234

File Name: gossamer_links_url_xss.nasl

Version: 1.21

Type: remote

Published: 7/20/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:gossamer_threads:gossamer_threads_links-sql

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 5/4/2005

Reference Information

CVE: CVE-2005-1492

BID: 13484

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990