Vulnerabilities > CVE-2005-1483 - Remote vulnerability in Interspire Articlelive 2005

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
interspire
nessus

Summary

Multiple cross-site scripting (XSS) vulnerabilities in ArticleLive 2005 allow remote attackers to inject arbitrary web script or HTML via the (1) Query, (2) Username, (3) LastName, (4) Biography, or (5) BlogId parameter.

Vulnerable Configurations

Part Description Count
Application
Interspire
1

Nessus

NASL familyCGI abuses
NASL idARTICLELIVE_MULTIPLE.NASL
descriptionThe remote host is running a version of Interspire ArticleLive that suffers from the following vulnerabilities : - A session handling flaw allowing a remote attacker to gain administrator access. - Multiple cross-site scripting vulnerabilities. The session handling vulnerability can be exploited by remote attackers to get administrator access to the remote content management system.
last seen2020-06-01
modified2020-06-02
plugin id18199
published2005-05-05
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/18199
titleInterspire ArticleLive Multiple Remote Vulnerabilities (XSS, Auth Bypass)
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description) {
  script_id(18199);
  script_version("1.19");

  script_cve_id("CVE-2005-1482", "CVE-2005-1483");
  script_bugtraq_id(13493);

  script_name(english:"Interspire ArticleLive Multiple Remote Vulnerabilities (XSS, Auth Bypass)");

 script_set_attribute(attribute:"synopsis", value:
"The remote server contains a PHP application that is affected by
multiple vulnerabilities." );
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of Interspire ArticleLive that
suffers from the following vulnerabilities :

  - A session handling flaw allowing a remote attacker to gain administrator
    access.
  - Multiple cross-site scripting vulnerabilities.

The session handling vulnerability can be exploited by remote
attackers to get administrator access to the remote content management
system." );
 script_set_attribute(attribute:"solution", value:
"Upgrade to version 2005.0.5 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/05/05");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/05/03");
 script_cvs_date("Date: 2018/06/13 18:56:26");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
  summary["english"] = "Checks for multiple vulnerabilities in Interspire ArticleLive";
  script_summary(english:summary["english"]);
 
  script_category(ACT_ATTACK);
  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");

  family["english"] = "CGI abuses";
  script_family(english:family["english"]);

  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_dependencies("http_version.nasl");
  script_require_keys("www/PHP");
  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);
if (!can_host_php(port:port)) exit(0);

init_cookiejar();

foreach dir (make_list (cgi_dirs(), "/admin"))
{
  set_http_cookie(name: 'auth', value: '1');
  set_http_cookie(name: 'userId', value: '1');
  #  set_http_cookie(name: 'PHPSESSID', value: 'f9a017964773a51af725ff154f0c4d3f');
  
  r = http_send_recv3(port: port, method: 'GET', item: strcat(dir, "/index.php"));
  if (isnull(r)) exit(0);

  if (("Interspire ArticleLive" >< r[2]) && ('<a href="index.php?ToDo=viewPages&pending=1' >< r[2]))
  {
    security_hole(port);
    set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
    exit(0);
  }
}