Plugin ID | 318 |
Plugin name | InShop inshop.pl cross site scripting |
Plugin filename | InShop inshop.pl cross site scripting.plugin |
Plugin filesize | 2499 bytes |
Plugin family | CGI |
Plugin created name | Marc Ruef |
Plugin created email | marc.ruef at computec.ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2005/01/05 |
Plugin version | 1.0 |
Plugin protocol | tcp |
Plugin port | 80 |
Plugin procedure exploit | open|send GET /inshop.pl?screen=<script>atk</script> HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# 200 *<script>atk</script>* |
Plugin exploit accuracy | 98 |
Plugin comment | The NASL script is Copyright (C) 2004 Tenable Network Security |
Bug published name | Carlos Ulver |
Bug affected | InMail |
Bug vulnerability class | Cross Site Scripting |
Bug description | The remote host is using InMail/InShop, a web applications written in Perl. An implementation error in the validation of the user input specifically in the script 'inmail.pl' in its 'acao' uri-argument and 'inshop.pl' in its 'screen' uri argument lead to an XSS vulnerability allowing a user to create cross site attacks, also allowing theft of cookie-based authentication credentials. |
Bug solution | None at this time. |
Bug fixing time | Approx. 20 minutes |
Bug exploit availability | Yes |
Bug exploit url | http://www.securityfocus.com/bid/11758/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 6 |
Bug simplicity | 8 |
Bug impact | 7 |
Bug risk | 7 |
Bug Nessus risk | Medium |
Bug check tools | Nessus can check this flaw with the plugin 15864 (InMail/InShop XSS). |
Source SecurityFocus BID | 11758 |
Source OSVDB ID | 11704 |
Source Nessus ID | 15864 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |