Synopsis
The remote web server is vulnerable to a cross-site scripting attack.
Description
According to its version, the remote installation of Chora fails to fully sanitize user-supplied input when setting the parent frame's page title by JavaScript in 'templates/common-footer.inc'. By leveraging this flaw, an attacker may be able to inject arbitrary HTML and script code into a user's browser to be executed in the context of the affected website, thereby resulting in the theft of session cookies and similar attacks.
Solution
Upgrade to Chora 1.2.3 or later.
Plugin Details
File Name: chora_footer_xss.nasl
Configuration: Enable thorough checks
Supported Sensors: Nessus
Vulnerability Information
CPE: cpe:/a:horde:chora
Required KB Items: www/chora
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Vulnerability Publication Date: 4/22/2005
Reference Information
BID: 13364
CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990