Vulnerabilities > CVE-2004-1657 - HTML Injection vulnerability in Newtelligence DasBlog Request Log

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
newtelligence
nessus
exploit available

Summary

Cross-site scripting (XSS) vulnerability in the Activity and Events Viewer for Newtelligence DasBlog allows remote attackers to inject arbitrary web script or HTML via the (1) User Agent or (2) Referrer HTTP headers.

Exploit-Db

descriptionNewtelligence DasBlog 1.x Request Log HTML Injection Vulnerability. CVE-2004-1657. Webapps exploit for php platform
idEDB-ID:24424
last seen2016-02-02
modified2004-09-01
published2004-09-01
reporterDominick Baier
sourcehttps://www.exploit-db.com/download/24424/
titleNewtelligence DasBlog 1.x Request Log HTML Injection Vulnerability

Nessus

NASL familyCGI abuses : XSS
NASL idDASBLOG_XSS.NASL
descriptionThe remote host is running dasBlog, a .NET blog system. According to its version number, it is vulnerable to multiple cross-site scripting issues. It is reported that versions up to and including 1.6.0 are vulnerable. The application does not sanitize the Referer and User-Agent HTTP headers. An attacker could use this to trick a user into executing arbitrary script code in the context of the web server.
last seen2020-06-01
modified2020-06-02
plugin id14639
published2004-09-02
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/14639
titleDasBlog Activity / Event Viewer Multiple HTTP Header XSS
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if(description)
{
 script_id(14639);
 script_version("1.17");
 script_cve_id("CVE-2004-1657");
 script_bugtraq_id(11086);
 script_xref(name:"Secunia", value:"12416");
 
 script_name(english:"DasBlog Activity / Event Viewer Multiple HTTP Header XSS");
 script_summary(english:"Checks for the presence of an XSS bug in dasBlog");

 script_set_attribute( attribute:"synopsis", value:
"The remote web application has multiple cross-site scripting
vulnerabilities." );
 script_set_attribute( attribute:"description", value:
"The remote host is running dasBlog, a .NET blog system. According to
its version number, it is vulnerable to multiple cross-site scripting
issues.  It is reported that versions up to and including 1.6.0 are
vulnerable.

The application does not sanitize the Referer and User-Agent HTTP
headers.  An attacker could use this to trick a user into executing
arbitrary script code in the context of the web server." );
 script_set_attribute(
   attribute:"see_also",
   value:"http://www.nessus.org/u?f2429b2e"
 );
 script_set_attribute(
   attribute:"solution", 
   value:"Apply the vendor patch referenced in the advisory."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/09/02");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/09/01");
 script_cvs_date("Date: 2018/07/06 11:26:05");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_family(english:"CGI abuses : XSS");

 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_dependencie("http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 exit(0);
}

#
# The script code starts here
#


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

function check(loc)
{
 local_var url, r;

 url = string(loc, "/CategoryView.aspx?category=nessus");
 r = http_send_recv3(method:"GET", item:url, port:port);
 if( isnull(r) ) exit(0);

 if( 'newtelligence' >< r[2] && 
     'dasBlog' >< r[2] &&
      egrep(pattern:"(Powered By:)? newtelligence dasBlog (0\.|1\.([0-5]\.|6\.[0-9][0-9][0-9][0-9]\.0))", string:r[2]) )
 {
 	security_warning(port);
	set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
	exit(0);
 }
}

foreach dir (cgi_dirs())
{
 check(loc:dir);
}