vHost up to 3.1.0r1 cross site scripting 2.0
 
Plugin ID89
Plugin namevHost up to 3.1.0r1 cross site scripting
Plugin filenamevHost up to 3.1.0r1 cross site scripting.plugin
Plugin filesize3075 bytes
Plugin familyCGI
Plugin created nameMarc Ruef
Plugin created emailmarc dot ruef at computec dot ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2004/03/23
Plugin updated nameMarc Ruef
Plugin updated emailmarc dot ruef at computec dot ch
Plugin updated webhttp://www.computec.ch
Plugin updated companycomputec.ch
Plugin updated date2004/11/14
Plugin version2.0
Plugin changelogCorrected the plugin structure and added the accuracy values in 1.2. Improved the pattern matching and introduced the plugin changelog in 2.0
Plugin protocoltcp
Plugin port80
Plugin procedure detectionopen|send GET /vhost.php?action=logout&time=1021231234 HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# ### *<!-- vhost *
Plugin detection accuracy90
Plugin commentThe version can not be determined correctly at the moment. You have to check the version for yourself or with another vulnerability scanner (e.g. Nessus). The time value is copied from Nessus and may be detected by different intrusion detection systems.
Bug affectedvHost up to 3.1.0r1
Bug not affectedvHost newer than 3.1.0r1
Bug vulnerability classCross Site Scripting
Bug descriptionThe remote host is running a version of vHost which is older than 3.1.0r1. There is a cross site scripting vulnerability in this version which may allow an attacker to steal the cookies of the legitimate users of this site.
Bug solutionUpgrade to the latest version of this software and limit unwanted connections and communications with firewalling.
Bug fixing time1 hour
Bug exploit availabilityYes
Bug exploit urlhttp://www.securityfocus.com/bid/9860/exploit/
Bug remoteYes
Bug localYes
Bug severityMedium
Bug popularity6
Bug simplicity8
Bug impact7
Bug risk7
Bug Nessus riskSerious
Bug check toolsNessus is able to do the same check more accurate.
Source SecurityFocus BID9860
Source Nessus ID12094
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.