Vulnerabilities > CVE-2014-3877 - Unspecified vulnerability in Ulli Horlacher FEX
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN ulli-horlacher
nessus
Summary
Incomplete blacklist vulnerability in Frams' Fast File EXchange (F*EX, aka fex) before fex-20140530 allows remote attackers to conduct cross-site scripting (XSS) attacks via the addto parameter to fup.
Vulnerable Configurations
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DLA-68.NASL |
description | [CVE-2014-3875] When inserting encoded newline characters into a request to rup, additional HTTP headers can be injected into the reply, as well as new HTML code on the top of the website. [CVE-2014-3876] The parameter akey is reflected unfiltered as part of the HTML page. Some characters are forbidden in the GET parameter due to filtering of the URL, but this can be circumvented by using a POST parameter. Nevertheless, this issue is exploitable via the GET parameter alone, with some user interaction. [CVE-2014-3877] The parameter addto is reflected only slightly filtered back to the user as part of the HTML page. Some characters are forbidden in the GET parameter due to filtering of the URL, but this can be circumvented by using a POST parameter. Nevertheless, this issue is exploitable via the GET parameter alone, with some user interaction. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. |
last seen | 2020-03-17 |
modified | 2015-03-26 |
plugin id | 82213 |
published | 2015-03-26 |
reporter | This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/82213 |
title | Debian DLA-68-1 : fex security update |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/126906/LSE-2014-05-22.txt |
id | PACKETSTORM:126906 |
last seen | 2016-12-05 |
published | 2014-06-03 |
reporter | Eric Sesterhenn |
source | https://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html |
title | F*EX 20140313-1 HTTP Response Splitting / Cross Site Scripting |
References
- http://fex.rus.uni-stuttgart.de/fex.html
- http://fex.rus.uni-stuttgart.de/fex.html
- http://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html
- http://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html
- https://www.lsexperts.de/advisories/lse-2014-05-22.txt
- https://www.lsexperts.de/advisories/lse-2014-05-22.txt