FreeBSD : frontpage -- XSS vulnerability (c0171f59-ea8a-11da-be02-000c6ec775d9)

This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Esteban Martinez Fayo reports :

The FrontPage Server Extensions 2002 (included in Windows Sever 2003
IIS 6.0 and available as a separate download for Windows 2000 and XP)
has a web page /_vti_bin/_vti_adm/fpadmdll.dll that is used for
administrative purposes. This web page is vulnerable to cross site
scripting attacks allowing an attacker to run client-side script on
behalf of an FPSE user. If the victim is an administrator, the
attacker could take complete control of a Front Page Server Extensions
2002 server.

To exploit the vulnerability an attacker can send a specially crafted
e-mail message to a FPSE user and then persuade the user to click a
link in the e-mail message.

In addition, this vulnerability can be exploited if an attacker hosts
a malicious website and persuade the user to visit it.

See also :

http://marc.info/?l=bugtraq&m=114487846329000
http://technet.microsoft.com/en-us/security/bulletin/ms06-017
http://www.nessus.org/u?909c12a8
http://www.nessus.org/u?24e60a67

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21591 (freebsd_pkg_c0171f59ea8a11dabe02000c6ec775d9.nasl)

Bugtraq ID:

CVE ID: CVE-2006-0015

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now