DCP-Portal Multiple Script XSS

medium Nessus Plugin ID 11446

Language:

Synopsis

The remote web server contains a PHP application that is affected by multiple issues.

Description

The version of DCP-Portal installed on the remote host fails to sanitize input to the script 'calendar.php' before using it to generate dynamic HTML, that could let an attacker execute arbitrary code in the browser of a legitimate user.

It may also be affected by HTML injection flaws, which could let an attacker to inject hostile HTML and script code that could permit cookie-based credentials to be stolen and other attacks, and HTTP response splitting flaw, that could let an attacker to influence or misrepresent how web content is served, cached or interpreted.

DCP-Portal has been reported to be vulnerable to an HTTP response splitting attack via the PHPSESSID parameter when passed to the calendar.php script. However, Nessus has not checked for this issue.

Solution

Unknown at this time.

See Also

https://seclists.org/bugtraq/2004/Oct/52

Plugin Details

Severity: Medium

ID: 11446

File Name: dcp_portal_xss.nasl

Version: 1.42

Type: remote

Published: 3/23/2003

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

Required KB Items: Settings/ParanoidReport, www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 3/18/2003

Reference Information

CVE: CVE-2003-1536, CVE-2004-2511, CVE-2004-2512

BID: 7141, 7144, 11338, 11339, 11340

CWE: 79