Synopsis
Some CGIs are candidate for extended injection tests.
Description
Nessus was able to to inject innocuous strings into CGI parameters and read them back in the HTTP response.
The affected parameters are candidates for extended injection tests like cross-site scripting attacks.
This is not a weakness per se, the main purpose of this test is to speed up other scripts. The results may be useful for a human pen-tester.
Plugin Details
File Name: torture_cgi_injectable_param.nasl
Supported Sensors: Nessus
Vulnerability Information
Required KB Items: Settings/enable_web_app_tests