AOL Instant Messenger URL refresh Tag XSS

Medium Nessus Network Monitor Plugin ID 1247


The remote AOL Client may be coerced into running arbitrary HTML code


The remote host is running AOL Instant Messenger (AIM). AIM is prone to an issue that may allow maliciously crafted HTML to perform unauthorized actions (such as adding entries to the buddy list) on behalf of the user of a vulnerable client. This condition is due to how the client handles aim: URIs. These actions will be taken without prompting or notifying the user. This issue was reported for versions of AIM running on Microsoft Windows and MacOS. The Linux version of this client is not affected.


Upgrade to the latest version of AOL Instant Messenger.

Plugin Details

Severity: Medium

ID: 1247

File Name: 1247.prm

Published: 2004/08/20

Modified: 2016/02/05

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:H/RL:U/RC:ND


Base Score: 5.3

Temporal Score: 5.3


Temporal Vector: CVSS3#E:H/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:aol:aim

Reference Information

CVE: CVE-2002-2169

BID: 5246

OSVDB: 60062