Vulnerabilities > CVE-2004-2528 - Unspecified vulnerability in Webcam Corp Webcam Watchdog 4.0.1A

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
webcam-corp
nessus
exploit available

Summary

Cross-site scripting (XSS) vulnerability in sresult.exe in Webcam Watchdog 4.0.1a allows remote attackers to inject arbitrary web script or HTML via the cam parameter.

Vulnerable Configurations

Part Description Count
Application
Webcam_Corp
1

Exploit-Db

descriptionWebcam Corp Webcam Watchdog 4.0.1 sresult.exe Cross-Site Scripting Vulnerability. CVE-2004-2528. Remote exploit for cgi platform
idEDB-ID:24342
last seen2016-02-02
modified2004-08-02
published2004-08-02
reporterdr_insane
sourcehttps://www.exploit-db.com/download/24342/
titleWebcam Corp Webcam Watchdog 4.0.1 sresult.exe Cross-Site Scripting Vulnerability

Nessus

NASL familyCGI abuses : XSS
NASL idWEBCAM_WATCHDOG_RESULT_XSS.NASL
descriptionThe remote host is running WebCamSoft
last seen2020-06-01
modified2020-06-02
plugin id14186
published2004-08-02
reporterThis script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/14186
titleWebCam Watchdog sresult.exe XSS
code
#
# (C) Tenable Network Security
#


include("compat.inc");

if(description)
{
 script_id(14186);
 script_cve_id("CVE-2004-2528");
 script_bugtraq_id(10837);
 if (defined_func("script_xref")) {
 }
 script_version ("1.22");
 name["english"] = "WebCam Watchdog sresult.exe XSS";

 script_name(english:name["english"]);
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a CGI application that is prone to a
cross-site scripting attack." );
 script_set_attribute(attribute:"description", value:
"The remote host is running WebCamSoft's watchdog software.  There is a
CGI script included in this software suite ('sresult.exe') that fails
to sanitize user-supplied input to the 'cam' parameter before using it
to generate dynamic output.  An attacker may exploit this issue to
steal cookie-based credentials from a legitimate user of this site." );
 script_set_attribute(attribute:"see_also", value:"https://securitytracker.com/id?1010824" );
 script_set_attribute(attribute:"solution", value:
"Unknown at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/08/02");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/07/29");
 script_cvs_date("Date: 2018/11/15 20:50:20");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:webcam_corp:webcam_watchdog");
script_end_attributes();

 
 summary["english"] = "Checks for the presence of an XSS bug in watchdog";
 
 script_summary(english:summary["english"]);
 
 script_category(ACT_ATTACK);
 
 script_copyright(english:"This script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
 family["english"] = "CGI abuses : XSS";
 script_family(english:family["english"]);
 script_dependencie("cross_site_scripting.nasl", "http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

test_cgi_xss(port: port, cgi: "/sresult.exe", qs: "cam=<script>foo</script>",
 pass_str: "<script>foo</script>");