Google Search Appliance proxystylesheet Parameter Multiple Remote Vulnerabilities (XSS, Code Exec, ID)

high Nessus Plugin ID 20241

Synopsis

The remote web server is affected by multiple flaws.

Description

The remote Google Search Appliance / Mini Search Appliance fails to sanitize user-supplied input to the 'proxystylesheet' parameter, which is used for customization of the search interface. Exploitation of this issue may lead to arbitrary code execution (as an unprivileged user), port scanning, file discovery, and cross-site scripting.

Solution

Contact Google for a fix.

See Also

http://www.nessus.org/u?516540e6

https://seclists.org/fulldisclosure/2005/Nov/652

Plugin Details

Severity: High

ID: 20241

File Name: google_search_appliance_proxystylesheet.nasl

Version: 1.28

Type: remote

Family: CGI abuses

Published: 11/22/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/h:google:search_appliance, cpe:/h:google:mini_search_appliance

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/21/2005

Vulnerability Publication Date: 11/21/2005

Exploitable With

Metasploit (Google Appliance ProxyStyleSheet Command Execution)

Reference Information

CVE: CVE-2005-3754, CVE-2005-3755, CVE-2005-3756, CVE-2005-3757, CVE-2005-3758

BID: 15509

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990