Vulnerabilities > CVE-2005-1783 - Unspecified vulnerability in W.M.R. Simpson Bookreview Beta1.0

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

BookReview beta 1.0 allows remote attackers to obtain the path of the web server via certain parameters to search.htm, possibly due to a search[string] parameter with a missing value or an incorrect submit[type] value, which reveals the path in the resulting error message. NOTE: it is not clear whether BookReview is available to the public. If not, then it should not be included in CVE.

Vulnerable Configurations

Part Description Count
Application
W.M.R._Simpson
1

Nessus

NASL familyCGI abuses : XSS
NASL idBOOKREVIEW_XSS.NASL
descriptionThe remote host is running the BookReview software. The remote version of this software is vulnerable to multiple cross-site scripting attacks due to a lack of sanitization of user-supplied data. Successful exploitation of this issue may allow an attacker to use the remote server to perform an attack against a third-party user.
last seen2020-06-01
modified2020-06-02
plugin id18375
published2005-05-27
reporterCopyright (C) 2005-2018 Josh Zlatin-Amishav
sourcehttps://www.tenable.com/plugins/nessus/18375
titleBookReview 1.0 Multiple Script XSS
code
#
# This script was written by Josh Zlatin-Amishav <josh at tkos dot co dot il>
#
# This script is released under the GNU GPLv2
#

# Changes by Tenable:
# - Revised plugin title (4/28/09)
# - Revised script summary (9/6/11)
# - Revised description and added URL comment and CPE (11/29/12)

include("compat.inc");

if(description)
{
 script_id(18375);
 script_version ("1.23");

 script_cve_id("CVE-2005-1782", "CVE-2005-1783");
 script_bugtraq_id(13783);

 script_name(english:"BookReview 1.0 Multiple Script XSS");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a CGI that is vulnerable to multiple
cross-site scripting attacks." );
 script_set_attribute(attribute:"description", value:
"The remote host is running the BookReview software. 

The remote version of this software is vulnerable to multiple
cross-site scripting attacks due to a lack of sanitization of
user-supplied data. 

Successful exploitation of this issue may allow an attacker to use the
remote server to perform an attack against a third-party user." );
  # http://lostmon.blogspot.com/2005/05/bookreview-10-multiple-variable-xss.html
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4a2658c9" );
 script_set_attribute(attribute:"solution", value:
"None at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/05/27");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/05/27");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:w.m.r._simpson:bookreview");
script_end_attributes();


 script_summary(english:"Checks for unauthenticated access to admin.asp");
 script_category(ACT_GATHER_INFO);
 script_family(english:"CGI abuses : XSS");
 script_copyright(english:"Copyright (C) 2005-2020 Josh Zlatin-Amishav");
 script_dependencies("http_version.nasl", "cross_site_scripting.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 exit(0);
}

include("global_settings.inc");
include("http_func.inc");
include("http_keepalive.inc");

global_var port;

port = get_http_port(default:80, embedded:TRUE);
if(!get_port_state(port))exit(0);
if (  get_kb_item(string("www/", port, "/generic_xss")) ) exit(0);

function check(url)
{
 local_var req, res;

 req = http_get(item:url +"/add_url.htm?node=%3Cscript%3Ealert('XSS')%3C/script%3E", port:port);
 res = http_keepalive_send_recv(port:port, data:req);
 if ( res == NULL ) exit(0);
 if ( "<script>alert('XSS')</script>XSS" >< res && 'Powered by BookReview' >< res )
 {
        security_warning(port);
	set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
        exit(0);
 }
}

foreach dir ( cgi_dirs() )
  check(url:dir);