SWsoft Plesk login_up.php3 reloaded cross site scripting 2.0
 
Plugin ID109
Plugin nameSWsoft Plesk login_up.php3 reloaded cross site scripting
Plugin filenameSWsoft Plesk login_up.php3 reloaded cross site scripting.plugin
Plugin filesize3221 bytes
Plugin familyCGI
Plugin created nameMarc Ruef
Plugin created emailmarc dot ruef at computec dot ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2004/08/26
Plugin updated nameMarc Ruef
Plugin updated emailmarc dot ruef at computec dot ch
Plugin updated webhttp://www.computec.ch
Plugin updated companycomputec.ch
Plugin updated date2004/11/14
Plugin version2.0
Plugin changelogCorrected the plugin structure and added the accuracy values in 1.1. Improved the pattern matching and introduced the plugin changelog in 2.0
Plugin protocoltcp
Plugin port80
Plugin procedure detectionopen|sleep|close|pattern_exists *
Plugin detection accuracy1
Plugin commentThe check is copied from the Nessus plugin. Please check the Nessus plugin ID for more details.
Bug affectedFreeBSD FTP server
Bug not affectedOther FTP servers
Bug vulnerability classCross Site Scripting
Bug descriptionThe remote host is running Plesk Reloaded (from SWsoft), a web based system administration tool. The remote version of this software is vulnerable to a cross-site scripting attack. An attacker can exploit it by compromising the values of the parameter cat_select in login_up.php3. This can be used to take advantage of the trust between a client and server allowing the malicious user to execute malicious JavaScript on the client's machine.
Bug solutionThe solution should be deactivated or de-installed if not necessary. To make it harder to find the web server the daemon could be configured to listen at another port (e.g. 2280). Try to prevent unwanted connection attempts by filtering traffic with firewalling.
Bug fixing time15 minutes
Bug exploit availabilityYes
Bug exploit urlhttp://www.securityfocus.com/bid/11024/exploit/
Bug remoteYes
Bug localYes
Bug severityMedium
Bug popularity2
Bug simplicity9
Bug impact7
Bug risk5
Bug Nessus riskMedium
Bug check toolsNessus is able to do nearly the same check. See the Nessus ID for more details.
Source SecurityFocus BID11024
Source Nessus ID14369
Source LiteratureHacking Intern - Angriffe, Strategien, Abwehr, Marc Ruef, Marko Rogge, Uwe Velten and Wolfram Gieseke, November 1, 2002, Data Becker, Düsseldorf, ISBN 381582284X
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.