phpGroupWare prior 0.9.16.003 cross site scripting 2.0
 
Plugin ID224
Plugin namephpGroupWare prior 0.9.16.003 cross site scripting
Plugin filenamePhpGroupWare prior 0.9.16.003 cross site scripting.plugin
Plugin filesize3609 bytes
Plugin familyCGI
Plugin created nameMarc Ruef
Plugin created emailmarc dot ruef at computec dot ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2004/09/14
Plugin updated nameMarc Ruef
Plugin updated emailmarc dot ruef at computec dot ch
Plugin updated webhttp://www.computec.ch
Plugin updated companycomputec.ch
Plugin updated date2004/11/14
Plugin version2.0
Plugin changelogCorrected the plugin structure and added the accuracy values in 1.1. Improved the pattern matching and introduced the plugin changelog in 2.0
Plugin protocoltcp
Plugin port80
Plugin procedure detectionopen|send GET /login.php HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# ### *phpGroupWare*0.[0-8].* OR HTTP/#.# ### *phpGroupWare*0.9.0* OR HTTP/#.# ### *phpGroupWare*0.9.1[0-3]* OR HTTP/#.# ### *phpGroupWare*0.9.14.00[0-6]*
Plugin detection accuracy80
Plugin commentThis ATK plugin is inspired by the Nessus plugin.
Bug published emailinfo at phpgroupware dot org
Bug published webhttp://www.phpgroupware.org
Bug published companyphpgroupware.org
Bug published date2004/09/07
Bug advisoryhttp://downloads.phpgroupware.org/changelog
Bug affectedphpGroupWare prior 0.9.16.003
Bug not affectedphpGroupWare newer than 0.9.16.003 or other solutions
Bug vulnerability classCross Site Scripting
Bug descriptionThe target system is running phpGroupWare prior 0.9.16.003, a multi-user groupware suite written in PHP. There is a cross site scripting vulnerability in it. An attacker may use this flaw to steal the cookies of the victim or may perform other attacks.
Bug solutionYou should install or upgrade the software to the latest version. See http://www.phpgroupware.org for more details. Change the default directory of the affected suite to make it harder to run pre-defined and automated attacks against the vulnerability. Also limit unwanted connections and communications with firewalling if possible.
Bug fixing timeApprox. 30 minutes
Bug exploit availabilityMaybe
Bug exploit urlhttp://www.securityfocus.com/bid/11144/exploit/
Bug remoteYes
Bug localNo
Bug severityMedium
Bug popularity4
Bug simplicity8
Bug impact7
Bug risk5
Bug Nessus riskLow
Bug check toolsNessus is able to do the same check,
Source SecurityFocus BID11130
Source Nessus ID14708
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.phpgroupware.org

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.