SAP DB / MaxDB WebDBM Multiple Parameter XSS

This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.

Synopsis :

The remote web server contains a script that is affected by multiple
cross-site scripting vulnerabilities.

Description :

The remote web server contains the WebDBM script, a component of SAP
DB / MaxDB.

The version of this script found on the remote host fails to sanitize
user-supplied input to its 'Database', 'User', and 'Password' parameters
before using it to generate dynamic content. An unauthenticated, remote
attacker may be able to leverage this issue to inject arbitrary HTML or
script code into a user's browser to be executed within the security
context of the affected site.

See also :

Solution :

The vendor reportedly recommends replacing WebDBM with 'Database

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.6
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 36072 ()

Bugtraq ID: 34319


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now