Comersus Cart Account Username Field XSS

medium Nessus Plugin ID 17983

Synopsis

The remote web server contains an ASP script that is affected by a cross-site scripting flaw.

Description

According to its banner, the remote host is running a version of Comersus Cart that fails to properly sanitize user input to the 'Username' field. An attacker can exploit this vulnerability to cause arbitrary HTML and script code to be executed by a user's browser in the context of the affected website when a user views the username;
eg, in the admin pages.

Solution

Upgrade to a version of Comersus Cart newer than 6.03.

Plugin Details

Severity: Medium

ID: 17983

File Name: comersus_customername_xss.nasl

Version: 1.18

Type: remote

Published: 4/6/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

Required KB Items: www/ASP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 4/5/2005

Reference Information

CVE: CVE-2005-1010

BID: 13000

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990