GForge help/tracker.php helpname Parameter XSS

medium Nessus Plugin ID 42964

Synopsis

The remote web server hosts an application that is prone to a cross- site scripting attack.

Description

The installed version of GForge fails to sanitize user-supplied input to the 'helpname' parameter in the 'help/tracker.php' script before using it to generate dynamic HTML content.

An unauthenticated, remote attacker may be able to leverage this issue to inject arbitrary HTML or script code into a user's browser to be executed within the security context of the affected site.

Solution

If using GForge on Debian, refer to Debian Security Advisory for patches.
Otherwise, contact the vendor for a solution.

See Also

https://www.debian.org/security/2009/dsa-1937

https://seclists.org/fulldisclosure/2009/Nov/237

Plugin Details

Severity: Medium

ID: 42964

File Name: gforge_helpname_xss.nasl

Version: 1.16

Type: remote

Published: 12/1/2009

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:gforge:gforge

Required KB Items: www/gforge

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Patch Publication Date: 11/21/2009

Vulnerability Publication Date: 11/21/2009

Reference Information

CVE: CVE-2009-3303

BID: 37088

CWE: 79

SECUNIA: 37450