Gossamer Threads Links < 3.0.4 Multiple Script XSS

medium Nessus Plugin ID 19235

Synopsis

The remote web server contains CGI scripts that are prone to cross- site scripting attacks.

Description

The remote host is running Gossamer Links, a web links management tool from Gossamer Threads and written in Perl.

The installed version of Gossamer Links fails to properly sanitize user-supplied input to various parameters of the 'user.cgi' and 'add.cgi' scripts, which are used by an administrator. By leveraging this flaw, an attacker may be able to cause arbitrary HTML and script code to be executed by a user's browser within the context of the affected application, leading to cookie theft and similar attacks.

Solution

Upgrade to Gossamer Links 3.0.4 or later.

See Also

http://www.nessus.org/u?4acf48fe

Plugin Details

Severity: Medium

ID: 19235

File Name: gossamer_links_multiple_xss.nasl

Version: 1.26

Type: remote

Published: 7/20/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS Score Rationale: No cve available for this vulnerability.

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: manual

CVSS v3

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 4.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:gossamer_threads:gossamer_threads_links-sql

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 7/6/2005

Reference Information

BID: 14160

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990