Plugin ID | 169 |
Plugin name | Citrix NFuse prior 1.6 launch.asp getLastError() Cross Site Scripting |
Plugin filename | Citrix NFuse prior 1.6 launch.asp getLastError Cross Site Scripting.plugin |
Plugin filesize | 4148 bytes |
Plugin family | CGI |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/09/08 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/14 |
Plugin version | 2.0 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.1. Improved the pattern matching and introduced the plugin changelog in 2.0 |
Plugin protocol | tcp |
Plugin port | 80 |
Plugin procedure exploit | open|send GET /launch.asp?NFuse_Application=>atk</script> HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# ### *<script>atk</script>* |
Plugin exploit accuracy | 99 |
Plugin comment | Check is inspired by the Nessus plugin. |
Bug published name | Eric Detoisien |
Bug published email | eric dot detoisien at global-secure dot fr |
Bug published web | http://www.global-secure.fr |
Bug published company | Global Secure |
Bug published date | 2002/03/27 |
Bug advisory | http://www.securityfocus.com/archive/1/264399 |
Bug affected | Citrix NFuse 1.51 and 1.6 |
Bug not affected | Citrix NFuse newer than 1.6 |
Bug vulnerability class | Cross Site Scripting |
Bug description | The remote host is running a Citrix NFuse Server prior 1.6. There is a bug in getLastError() which makes it vulnerable to cross site scripting attacks. An attacker may use this bug to run arbitrary web code in the context of the web site. |
Bug solution | You should install or upgrade the software to the latest version. See http://www.citrix.com for more details. Change the default directory of the affected suite to make it harder to run pre-defined and automated attacks against the vulnerability. A solution named Appgate is able to secure Citrix NFuse and MetaFrame. See http://www.appgate.com/knowledge_center/2_White_Papers_and_Other_Documentation/Gerald_Matt_GSEC.pdf for more details. Also limit unwanted connections and communications with firewalling if possible. |
Bug fixing time | Approx. 1 hour |
Bug exploit availability | Yes |
Bug exploit url | http://www.securityfocus.com/bid/4372/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 7 |
Bug simplicity | 8 |
Bug impact | 7 |
Bug risk | 7 |
Bug Nessus risk | Medium |
Bug ISS Scanner rating | High Risk |
Bug check tools | Nessus is able to do the same check. The possibilities of exploiting this kind of vulnerabilities is well-known and well documented. |
Source CVE | 2002-0504 |
Source SecurityFocus BID | 4372 |
Source OSVDB ID | 9257 |
Source SecuriTeam URL | http://www.securiteam.com/securitynews/5XP061F4UE.html |
Source Nessus ID | 14626 |
Source ISS X-Force ID | 8659 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://archives.neohapsis.com/archives/bugtraq/2002-03/0334.html |