|
Family: CGI abuses : XSS --> Category: attack
PHPSysInfo Multiple Cross-Site Scripting Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Checks for multiple cross-site scripting vulnerabilities in PHPSysInfo
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains two PHP scripts that are prone to
cross-site scripting attacks.
Description :
The remote host is running phpSysInfo, a PHP script which parses the
/proc entries on Linux systems and displays them in HTML.
The version of phpSysInfo installed on the remote host is affected by
multiple cross-site scripting vulnerabilities due to its failure to
sanitize user-input to the 'sensor_program' parameter of 'index.php'
and the 'text[language]', 'text[template]', and 'VERSION' parameters
of 'system_footer.php'. If PHP's 'register_globals' setting is
enabled, a remote attacker can exploit these flaws to have arbitrary
script rendered in the browser of a user in the context of the
affected web site.
See also :
http://www.securityfocus.com/archive/1/394086
http://sourceforge.net/project/shownotes.php?release_id=376350&group_id=15
Solution :
Upgrade to phpSysInfo 2.5 or later.
Threat Level:
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|