Vulnerabilities > CVE-2004-2059 - Multiple vulnerability in XLineSoft ASPRunner

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
xlinesoft
nessus
exploit available

Summary

Multiple cross-site scripting vulnerabilities in ASPRunner 2.4 allow remote attackers to inject arbitrary web script or HTML via the (1) SearchFor parameter in [TABLE-NAME]_search.asp, (2) SQL parameter in [TABLE-NAME]_edit.asp, (3) SearchFor parameter in [TABLE]_list.asp, or (4) SQL parameter in export.asp.

Exploit-Db

  • descriptionXLineSoft ASPRunner 1.0/2.x [TABLE]_list.asp SearchFor Parameter XSS. CVE-2004-2059. Webapps exploit for asp platform
    idEDB-ID:24315
    last seen2016-02-02
    modified2004-07-26
    published2004-07-26
    reporterFerruh Mavituna
    sourcehttps://www.exploit-db.com/download/24315/
    titleXLineSoft ASPRunner 1.0/2.x - TABLE_list.asp SearchFor Parameter XSS
  • descriptionXLineSoft ASPRunner 1.0/2.x export.asp SQL Parameter XSS. CVE-2004-2059. Webapps exploit for asp platform
    idEDB-ID:24316
    last seen2016-02-02
    modified2004-07-26
    published2004-07-26
    reporterFerruh Mavituna
    sourcehttps://www.exploit-db.com/download/24316/
    titleXLineSoft ASPRunner 1.0/2.x export.asp SQL Parameter XSS
  • descriptionXLineSoft ASPRunner 1.0/2.x [TABLE-NAME]_edit.asp SQL Parameter XSS². CVE-2004-2059. Webapps exploit for asp platform
    idEDB-ID:24314
    last seen2016-02-02
    modified2004-07-26
    published2004-07-26
    reporterFerruh Mavituna
    sourcehttps://www.exploit-db.com/download/24314/
    titleXLineSoft ASPRunner 1.0/2.x - TABLE-NAME_edit.asp SQL Parameter XSS
  • descriptionXLineSoft ASPRunner 1.0/2.x [TABLE-NAME]_search.asp Typeen Parameter XSS. CVE-2004-2059. Webapps exploit for asp platform
    idEDB-ID:24313
    last seen2016-02-02
    modified2004-07-26
    published2004-07-26
    reporterFerruh Mavituna
    sourcehttps://www.exploit-db.com/download/24313/
    titleXLineSoft ASPRunner 1.0/2.x - TABLE-NAME_search.asp Typeen Parameter XSS

Nessus

NASL familyCGI abuses
NASL idASPRUNNER_MULT.NASL
descriptionThe remote host is running ASPrunner prior to version 2.5. There are multiple flaws in this version of ASPrunner which would enable a remote attacker to read and/or modify potentially confidential data. An attacker, exploiting this flaw, would need access to the web server via the network.
last seen2020-06-01
modified2020-06-02
plugin id14233
published2004-08-09
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/14233
titleASPrunner 2.4 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(14233);
  script_version("1.33");
  script_cvs_date("Date: 2018/11/15 20:50:16");

  script_cve_id("CVE-2004-2057", "CVE-2004-2058", "CVE-2004-2059", "CVE-2004-2060");
  script_bugtraq_id(10799);

  script_name(english:"ASPrunner 2.4 Multiple Vulnerabilities");
  script_summary(english:"Check for multiple flaws in ASPrunner");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server contains an ASP script which is vulnerable to a
cross-site scripting issue.");
  script_set_attribute(attribute:"description", value:
"The remote host is running ASPrunner prior to version 2.5. There are
multiple flaws in this version of ASPrunner which would enable a
remote attacker to read and/or modify potentially confidential data.

An attacker, exploiting this flaw, would need access to the web server
via the network.");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2004/Jul/300");
  script_set_attribute(attribute:"solution", value:"Unknown at this time.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:U/RC:ND");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

  script_set_attribute(attribute:"vuln_publication_date", value:"2004/07/26");
  script_set_attribute(attribute:"plugin_publication_date", value:"2004/08/09");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
  script_family(english:"CGI abuses");

  script_dependencies("http_version.nasl", "no404.nasl", "cross_site_scripting.nasl");
  script_require_keys("Settings/ParanoidReport");
  script_require_ports("Services/www", 80);
  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80, embedded: 0);

if (report_paranoia < 2) audit(AUDIT_PARANOID);

if (get_kb_item(strcat("www/", port, "/generic_xss"))) exit(0);

# there are multiple flaws.  We'll check for XSS flaw which will be an indicator
# of other flaws
#
# exploit string from http://www.securityfocus.com/bid/10799/exploit/
init = string("/export.asp?SQL=%22%3E%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3Eselect+%5Bword_id%5D%2C+%5Bword_id%5D%2C+++%5Btr%5D%2C+++%5Ben%5D%2C+++%5Bdesc%5D++From+%5Bdictionary%5D++order+by+%5Ben%5D+desc&mypage=1&pagesize=20");

r = http_send_recv3(port: port, item: init, method: 'GET');

if ("<script>alert" >< r[2])
{
  	security_hole(port);
	set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
}