Sawmill < 7.1.14 GET Request Query String XSS

low Nessus Network Monitor Plugin ID 3219

Synopsis

The remote host is vulnerable to a Cross-Site Scripting (XSS) attack.

Description

The remote host is running Sawmill, a weblog analysis package. The version of Sawmill installed on the remote host suffers from a cross-site scripting flaw because its standalone web server treats an arbitrary query string appended to a GET request as a configuration command and fails to sanitize it before using it in an error page. An unauthenticated attacker may be able to exploit this issue to steal authentication information of users of the affected application.

Solution

Upgrade to version 7.1.14 or higher or use Sawmill in CGI mode.

See Also

http://archives.neohapsis.com/archives/bugtraq/2005-09/0114.html

http://www.nta-monitor.com/news/xss/sawmill/index.htm

Plugin Details

Severity: Low

ID: 3219

Family: Web Servers

Published: 9/9/2005

Updated: 3/6/2019

Nessus ID: 19681

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:sawmill:sawmill

Reference Information

CVE: CVE-2005-2950

BID: 14789