Advanced Guestbook User-Agent Header HTML Injection

medium Nessus Plugin ID 19308

Synopsis

The remote web server contains a PHP script that is vulnerable to a cross-site scripting issue.

Description

The remote host is running Advanced Guestbook, a free guestbook written in PHP.

The installed version of Advanced Guestbook fails to properly sanitize the 'HTTP_USER_AGENT' environment variable before using it in dynamically-generated content. An attacker can exploit this flaw to launch cross-site scripting attacks against the affected application.

Solution

Upgrade to Advanced Guestbook version 2.3.3 or later.

See Also

https://proxy2.de/forum/viewtopic.php?t=4144

Plugin Details

Severity: Medium

ID: 19308

File Name: advanced_guestbook_user_agent_xss.nasl

Version: 1.29

Type: remote

Published: 7/27/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 7/26/2005

Reference Information

BID: 14391

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990