Yahoo! Messenger ymsgr URI Arbitrary Script Execution

high Nessus Network Monitor Plugin ID 1262

Synopsis

The remote host is vulnerable to a script injection flaw

Description

The remote host is running a version of Yahoo Instant Messenger that is vulnerable to a script injection attack. It is possible to create a URL that contains the ymsgr:addview? function and which points to a webpage containing malicious code. This code will be automatically loaded and rendered by the Yahoo Client allowing for the execution of attacker supplied code that will run with the privileges of the IM client user.

Solution

Upgrade to the latest version of Yahoo Instant Messenger.

Plugin Details

Severity: High

ID: 1262

Published: 8/20/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:yahoo:messenger

Reference Information

CVE: CVE-2002-0032

BID: 4838