CGI Generic On Site Request Forgery (OSRF)
Medium Nessus Plugin ID 47832
SynopsisThe remote web server may be prone to On Site Request Forgery attacks.
DescriptionThe remote web server hosts CGI scripts that fail to adequately sanitize request strings with special characters like dots, slashes, backslashes, equal signs, question marks, etc.
By leveraging this issue, an attacker may be able to cause arbitrary GET requests to be executed by a user when he visits the vulnerable pages.
On Site Request Forgery (OSRF) is a variant of the wider Cross-Site Request Forgery (CSRF) attack class.
** The web application will not be affected by this weakness if the
** sensitive operations are all performed through POST or if some common
** defenses against Cross-Site Request Forgery are implemented.
** Even if this weakness cannot be exploited in the current state of the
** web application, allowing users to inject arbitrary characters in
** pages is definitely dangerous.
SolutionRestrict access to the vulnerable application. Contact the vendor for a patch or upgrade.