Vulnerabilities > CVE-2002-2073 - Unspecified vulnerability in Microsoft Site Server, Site Server Commerce and Windows NT

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
microsoft
nessus
exploit available

Summary

Cross-site scripting (XSS) vulnerability in the default ASP pages on Microsoft Site Server 3.0 on Windows NT 4.0 allows remote attackers to inject arbitrary web script or HTML via the (1) ctr parameter in Default.asp and (2) the query string to formslogin.asp.

Vulnerable Configurations

Part Description Count
Application
Microsoft
2
OS
Microsoft
1

Exploit-Db

descriptionMicrosoft Site Server 3.0 Cross-Site Scripting Vulnerability. CVE-2002-2073. Remote exploit for windows platform
idEDB-ID:21260
last seen2016-02-02
modified2002-01-29
published2002-01-29
reporterrain forest puppy
sourcehttps://www.exploit-db.com/download/21260/
titleMicrosoft Site Server 3.0 - Cross-Site Scripting Vulnerability

Nessus

NASL familyCGI abuses : XSS
NASL idSITESERVER_XSS.NASL
descriptionThe script
last seen2020-06-01
modified2020-06-02
plugin id33928
published2008-08-18
reporterThis script is Copyright (C) 2008-2018 Westpoint Ltd
sourcehttps://www.tenable.com/plugins/nessus/33928
titleMS Site Server < 3.0 formslogin.asp url Parameter XSS
code

# Changes by Tenable :
# - Updated to use compat.inc (11/20/2009)
# - Updated to use 'a' instead of 'an' (3/2/2018)

include("compat.inc");

if (description)
{
  
  script_id(33928);
  script_version("1.16");

  script_cve_id("CVE-2002-2073");
  script_bugtraq_id(3999);

  script_name(english:"MS Site Server < 3.0 formslogin.asp url Parameter XSS");
  script_summary(english:"Checks for a Cross-Site Scripting flaw in formslogin.asp, part of Microsoft Site Server");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server is vulnerable to a cross-site scripting attack." );
 script_set_attribute(attribute:"description", value:
"The script 'formslogin.asp' fails to sanitize the 'url' parameter. 
This allows remote attackers to inject arbitrary web scripts or HTML." );
 #https://web.archive.org/web/20020228224829/http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0033.html
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6bc870f9");
 script_set_attribute(attribute:"solution", value:
"Contact the vendor for a patch or upgrade to a unaffected version." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2008/08/18");
 script_set_attribute(attribute:"vuln_publication_date", value: "2002/01/30");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();


  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses : XSS");
  script_copyright(english:"This script is Copyright (C) 2008-2020 Westpoint Ltd");
  script_dependencies("http_version.nasl", "cross_site_scripting.nasl");
  script_require_ports("Services/www", 80);
  script_require_keys("www/ASP");
  exit(0);
}


include("global_settings.inc");
include("http_func.inc");
include("http_keepalive.inc");

# Run against working web services
port = get_http_port(default:80, embedded:TRUE);

if ( get_kb_item(strcat("www/", port, "/generic_xss")) ||
   ! can_host_asp(port: port) ) exit(0);

# Build the exploit string
exploit=string("><script>alert('Vulnerable');</script>");
url=string("/_mem_bin/formslogin.asp?url=", exploit);

request = http_get(item:url, port:port);
response = http_keepalive_send_recv(port:port, data:request, bodyonly:TRUE);

if(response == NULL) exit(0);

# There's a problem if we see our exploit in the response.
if (exploit >< response && egrep(pattern:'^HTTP/[01.]+ +200 ', string:response))
{  
        set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
        desc = strcat('\n',build_url(port:port, qs:url));
        security_warning(port:port, extra:desc);
        exit(0);
}