Plugin ID | 224 |
Plugin name | phpGroupWare prior 0.9.16.003 cross site scripting |
Plugin filename | PhpGroupWare prior 0.9.16.003 cross site scripting.plugin |
Plugin filesize | 3609 bytes |
Plugin family | CGI |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/09/14 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/14 |
Plugin version | 2.0 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.1. Improved the pattern matching and introduced the plugin changelog in 2.0 |
Plugin protocol | tcp |
Plugin port | 80 |
Plugin procedure detection | open|send GET /login.php HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# ### *phpGroupWare*0.[0-8].* OR HTTP/#.# ### *phpGroupWare*0.9.0* OR HTTP/#.# ### *phpGroupWare*0.9.1[0-3]* OR HTTP/#.# ### *phpGroupWare*0.9.14.00[0-6]* |
Plugin detection accuracy | 80 |
Plugin comment | This ATK plugin is inspired by the Nessus plugin. |
Bug published email | info at phpgroupware dot org |
Bug published web | http://www.phpgroupware.org |
Bug published company | phpgroupware.org |
Bug published date | 2004/09/07 |
Bug advisory | http://downloads.phpgroupware.org/changelog |
Bug affected | phpGroupWare prior 0.9.16.003 |
Bug not affected | phpGroupWare newer than 0.9.16.003 or other solutions |
Bug vulnerability class | Cross Site Scripting |
Bug description | The target system is running phpGroupWare prior 0.9.16.003, a multi-user groupware suite written in PHP. There is a cross site scripting vulnerability in it. An attacker may use this flaw to steal the cookies of the victim or may perform other attacks. |
Bug solution | You should install or upgrade the software to the latest version. See http://www.phpgroupware.org for more details. Change the default directory of the affected suite to make it harder to run pre-defined and automated attacks against the vulnerability. Also limit unwanted connections and communications with firewalling if possible. |
Bug fixing time | Approx. 30 minutes |
Bug exploit availability | Maybe |
Bug exploit url | http://www.securityfocus.com/bid/11144/exploit/ |
Bug remote | Yes |
Bug local | No |
Bug severity | Medium |
Bug popularity | 4 |
Bug simplicity | 8 |
Bug impact | 7 |
Bug risk | 5 |
Bug Nessus risk | Low |
Bug check tools | Nessus is able to do the same check, |
Source SecurityFocus BID | 11130 |
Source Nessus ID | 14708 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.phpgroupware.org |