Yahoo! Messenger ymsgr URI Arbitrary Script Execution

High Nessus Network Monitor Plugin ID 1262

Synopsis

The remote host is vulnerable to a script injection flaw

Description

The remote host is running a version of Yahoo Instant Messenger that is vulnerable to a script injection attack. It is possible to create a URL that contains the ymsgr:addview? function and which points to a webpage containing malicious code. This code will be automatically loaded and rendered by the Yahoo Client allowing for the execution of attacker supplied code that will run with the privileges of the IM client user.

Solution

Upgrade to the latest version of Yahoo Instant Messenger.

Plugin Details

Severity: High

ID: 1262

File Name: 1262.prm

Published: 2004/08/20

Modified: 2016/01/15

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:yahoo:messenger

Reference Information

CVE: CVE-2002-0032

BID: 4838