ID

VAR-200512-0171


CVE

CVE-2005-4391


TITLE

Retired: Mindroute Lemoon/Damoon Search Module Cross-Site Scripting Vulnerability

Trust: 0.9

sources: BID: 15949 // CNNVD: CNNVD-200512-462

DESCRIPTION

Cross-site scripting (XSS) vulnerability in damoon allows remote attackers to inject arbitrary web script or HTML via unspecified search parameters, possibly the q parameter. lemoon and damoon are prone to a cross-site scripting vulnerability. This issue is due to a failure in the applications to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks. Further information from the vendor states this issue does not affect lemoon or damoon directly, or sites utilizing the core elements of the software. This BID is being retired. TITLE: damoon "q" Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA18118 VERIFY ADVISORY: http://secunia.com/advisories/18118/ CRITICAL: Less critical IMPACT: Cross Site Scripting WHERE: >From remote SOFTWARE: damoon http://secunia.com/product/6563/ DESCRIPTION: r0t has reported a vulnerability in damoon, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed to the "q" parameter when performing a search isn't properly sanitised before being returned to the user. SOLUTION: Edit the source code to ensure that input is properly sanitised. PROVIDED AND/OR DISCOVERED BY: r0t ORIGINAL ADVISORY: http://pridels.blogspot.com/2005/12/damoon-xss-vuln.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2005-4391 // BID: 15949 // VULHUB: VHN-15599 // PACKETSTORM: 42436

AFFECTED PRODUCTS

vendor:mindroutemodel:damoonscope:eqversion:*

Trust: 1.0

vendor:mindroutemodel:damoonscope: - version: -

Trust: 0.9

vendor:mindroutemodel:lemoonscope:eqversion:2.0

Trust: 0.3

sources: BID: 15949 // CNNVD: CNNVD-200512-462 // NVD: CVE-2005-4391

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-4391
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200512-462
value: MEDIUM

Trust: 0.6

VULHUB: VHN-15599
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2005-4391
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-15599
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-15599 // CNNVD: CNNVD-200512-462 // NVD: CVE-2005-4391

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-4391

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200512-462

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 42436 // CNNVD: CNNVD-200512-462

EXTERNAL IDS

db:BIDid:15949

Trust: 2.0

db:SECUNIAid:18118

Trust: 1.8

db:NVDid:CVE-2005-4391

Trust: 1.7

db:OSVDBid:21817

Trust: 1.7

db:CNNVDid:CNNVD-200512-462

Trust: 0.7

db:XFid:40001

Trust: 0.6

db:VULHUBid:VHN-15599

Trust: 0.1

db:PACKETSTORMid:42436

Trust: 0.1

sources: VULHUB: VHN-15599 // BID: 15949 // PACKETSTORM: 42436 // CNNVD: CNNVD-200512-462 // NVD: CVE-2005-4391

REFERENCES

url:http://pridels0.blogspot.com/2005/12/damoon-xss-vuln.html

Trust: 2.0

url:http://www.securityfocus.com/bid/15949

Trust: 1.7

url:http://www.osvdb.org/21817

Trust: 1.7

url:http://secunia.com/advisories/18118

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/40001

Trust: 1.1

url:http://www.mindroute.us/?id=2452

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/40001

Trust: 0.6

url:http://pridels0.blogspot.com/2005/12/lemoon-xss-vuln.html

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://pridels.blogspot.com/2005/12/damoon-xss-vuln.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/6563/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/18118/

Trust: 0.1

sources: VULHUB: VHN-15599 // BID: 15949 // PACKETSTORM: 42436 // CNNVD: CNNVD-200512-462 // NVD: CVE-2005-4391

CREDITS

rakstija r0t3d3Vil is credited with the discovery of this vulnerability.

Trust: 0.9

sources: BID: 15949 // CNNVD: CNNVD-200512-462

SOURCES

db:VULHUBid:VHN-15599
db:BIDid:15949
db:PACKETSTORMid:42436
db:CNNVDid:CNNVD-200512-462
db:NVDid:CVE-2005-4391

LAST UPDATE DATE

2024-08-14T14:42:12.318000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-15599date:2017-07-20T00:00:00
db:BIDid:15949date:2006-01-17T22:10:00
db:CNNVDid:CNNVD-200512-462date:2006-06-06T00:00:00
db:NVDid:CVE-2005-4391date:2017-07-20T01:29:14.627

SOURCES RELEASE DATE

db:VULHUBid:VHN-15599date:2005-12-20T00:00:00
db:BIDid:15949date:2005-12-19T00:00:00
db:PACKETSTORMid:42436date:2005-12-22T07:01:32
db:CNNVDid:CNNVD-200512-462date:2005-12-20T00:00:00
db:NVDid:CVE-2005-4391date:2005-12-20T11:03:00