CVE-2002-1529
CVSS4.3
发布时间 :2003-03-31 00:00:00
修订时间 :2008-09-05 16:30:50
NMCOES    

[原文]Cross-site scripting (XSS) vulnerability in msgError.asp for the administrative web interface (STEMWADM) for SurfControl SuperScout Email Filter allows remote attackers to insert arbitrary script or HTML via the Reason parameter.


[CNNVD]SurfControl SuperScout Email Filter msgError.asp跨站脚本执行漏洞(CNNVD-200303-081)

        
        SurfControl SuperScout Email Filter SMTP是一款SMTP服务下邮件过滤程序,可以对多种SMTP服务程序如Microsoft Exchange、Lotus Notes/Domino、Netscape Mail Server、Sendmail进行过滤,运行在Windows操作系统平台下。并且提供基于WEB接口进行远程管理。
        SurfControl SuperScout Email Filter的WEB管理接口的msgError.asp脚本没有对用户提交的输入缺少过滤,远程攻击者可以利用这个漏洞进行跨站脚本执行攻击,获得基于Cookie认证的敏感信息。
        WEB管理接口的userlist.asp脚本对Reason参数的值缺少检查过滤,攻击者可以构建包含恶意脚本代码的Reason参数,并诱使用户点击这个恶意链接,可导致用户基于认证的Cookie信息泄露。
        

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:surfcontrol:superscout_email_filter:4.0::smtp
cpe:/a:surfcontrol:superscout_email_filter:3.5.1
cpe:/a:surfcontrol:superscout_email_filter:3.5SurfControl SuperScout Email Filter 3.5

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1529
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1529
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200303-081
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/5928
(VENDOR_ADVISORY)  BID  5928
http://www.iss.net/security_center/static/10319.php
(VENDOR_ADVISORY)  XF  superscout-emailfilter-error-xss(10319)
http://archives.neohapsis.com/archives/bugtraq/2002-10/0137.html
(VENDOR_ADVISORY)  BUGTRAQ  20021008 Four Vulnerabilities in SurfControl's SuperScout Email Filter Administrative Server

- 漏洞信息

SurfControl SuperScout Email Filter msgError.asp跨站脚本执行漏洞
中危 输入验证
2003-03-31 00:00:00 2005-05-13 00:00:00
远程  
        
        SurfControl SuperScout Email Filter SMTP是一款SMTP服务下邮件过滤程序,可以对多种SMTP服务程序如Microsoft Exchange、Lotus Notes/Domino、Netscape Mail Server、Sendmail进行过滤,运行在Windows操作系统平台下。并且提供基于WEB接口进行远程管理。
        SurfControl SuperScout Email Filter的WEB管理接口的msgError.asp脚本没有对用户提交的输入缺少过滤,远程攻击者可以利用这个漏洞进行跨站脚本执行攻击,获得基于Cookie认证的敏感信息。
        WEB管理接口的userlist.asp脚本对Reason参数的值缺少检查过滤,攻击者可以构建包含恶意脚本代码的Reason参数,并诱使用户点击这个恶意链接,可导致用户基于认证的Cookie信息泄露。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 暂时关闭浏览器的JavaScript功能。
        厂商补丁:
        SurfControl
        -----------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.surfcontrol.com/

- 漏洞信息 (21924)

SurfControl SuperScout Email Filter 3.5 MsgError.ASP Cross-Site Scripting Vulnerability (EDBID:21924)
asp webapps
2002-10-08 Verified
0 ken@FTU
N/A [点击下载]
source: http://www.securityfocus.com/bid/5928/info

SurfControl SuperScout Email Filter comes with a web-based interface to provide remote access to administrative facilities.

The web-based admin interface is prone to cross-site scripting attacks.

It is possible to create a link containing malicious HTML and script code to certain pages in the interface. When this link is visited by a web user, the attacker-supplied script code will execute in user's web client in the security context of the web interface.

This may potentially be exploited to steal cookie-based authentication credentials from legitimate users of the interface.

http://www.example.com/web/msgError.asp?Redirect=loginhtm&Reason=<script>alert(document.cookie);</script>		

- 漏洞信息

9210
SurfControl SuperScout Email Filter msgError.asp Reason Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-10-09 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

SurfControl SuperScout Email Filter MsgError.ASP Cross-Site Scripting Vulnerability
Input Validation Error 5928
Yes No
2002-10-08 12:00:00 2009-07-11 06:06:00
Discovery of this issue is credited to 'ken'@FTU <ken@ftusecurity.com>.

- 受影响的程序版本

SurfControl SuperScout Email Filter for SMTP 4.0
SurfControl SuperScout Email Filter 3.5.1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows NT 4.0 SP6a
SurfControl SuperScout Email Filter 3.5

- 漏洞讨论

SurfControl SuperScout Email Filter comes with a web-based interface to provide remote access to administrative facilities.

The web-based admin interface is prone to cross-site scripting attacks.

It is possible to create a link containing malicious HTML and script code to certain pages in the interface. When this link is visited by a web user, the attacker-supplied script code will execute in user's web client in the security context of the web interface.

This may potentially be exploited to steal cookie-based authentication credentials from legitimate users of the interface.

- 漏洞利用

The following proof-of-concept example was provided:

http://www.example.com/web/msgError.asp?Redirect=loginhtm&amp;Reason=&lt;script&gt;alert(document.cookie);&lt;/script&gt;

- 解决方案

The vendor has reportedly released a fix. Affected users should contact the vendor about obtaining fixes.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站