Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses : XSS --> Category: attack

Fusebox fuseaction Parameter Cross-Site Scripting Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks for fuseaction parameter cross-site scripting vulnerability in Fusebox

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a web application that is vulnerable to
a cross-site scripting attack.

Description :

The remote host is running Fusebox, a framework for building web-based
applications in Cold Fusion and PHP.

The installed web application appears to have been created using
Fusebox in such a way that it fails to sanitize user-supplied input to
the 'fuseaction' parameter before using it in dynamically generated
webpages.

Note that this flaw may not be specific to the Fusebox framework per
se but instead be an implementation issue since Fusebox itself does
not generate any HTML but lets the developer control all output.

See also :

http://archives.neohapsis.com/archives/bugtraq/2005-08/0043.html
http://archives.neohapsis.com/archives/bugtraq/2005-08/0135.html

Solution :

Unknown at this time.

Threat Level:

Low / CVSS Base Score : 2
(AV:R/AC:H/Au:NR/C:N/A:N/I:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.