FireStats window-add-excluded-ip.php 'edit' parameter XSS

This script is Copyright (C) 2010-2015 Tenable Network Security, Inc.

Synopsis :

The remote web server hosts a web application that is affected by a
cross-site scripting vulnerability.

Description :

The version of FireStats installed on the remote host fails to
properly sanitize user-supplied input to the 'edit' parameter of the
'window-add-excluded-ip.php' script.

An unauthenticated, remote attacker can leverage this issue to execute
arbitrary script code in a user's browser.

Note that this version of FireStats is likely affected by cross-site
scripting issues in multiple other scripts; however, Nessus has not
tested for these.

See also :

Solution :

Upgrade to version 1.6.6 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.6
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 47746 (firestats_excluded_ip_edit_xss.nasl)

Bugtraq ID: 41548


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now