MS11-061: Vulnerability in Remote Desktop Web Access Could Allow Elevation of Privilege (2546250)

Medium Nessus Plugin ID 55791


A web application running on the remote Windows host has a cross-site scripting vulnerability.


The version of Remote Desktop Web Access running on the remote host has a reflected cross-site scripting vulnerability. Input to the 'ReturnUrl' parameter of login.aspx is not properly sanitized.

A remote attacker could exploit this by tricking a user into requesting a maliciously crafted URL, resulting in arbitrary script code execution.


Microsoft has released a patch for Windows 2008 R2.

See Also

Plugin Details

Severity: Medium

ID: 55791

File Name: smb_nt_ms11-061.nasl

Version: $Revision: 1.14 $

Type: local

Agent: windows

Published: 2011/08/09

Modified: 2017/07/26

Dependencies: 44871, 57033, 13855

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/08/09

Vulnerability Publication Date: 2011/08/09

Reference Information

CVE: CVE-2011-1263

BID: 49040

OSVDB: 74406

MSFT: MS11-061

IAVB: 2011-B-0103

MSKB: 2546250