ID

VAR-200512-0178


CVE

CVE-2005-4398


TITLE

Lemoon/Damoon Search Module Cross-Site Scripting Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200512-441

DESCRIPTION

NOTE: the vendor has disputed this issue. Cross-site scripting (XSS) vulnerability in lemoon 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified search parameters, possibly the q parameter. NOTE: the vendor has disputed this issue, saying "Sites are built on top of ASP.NET and you use lemoon core objects to easily manage and render content. The XSS vuln. you are referring to exists in one of our public sites built on lemoon i.e. a custom made site (as all sites are). The problem exists in a UserControl that handles form input and is in no way related to the lemoon core product. lemoon and damoon are prone to a cross-site scripting vulnerability. This issue is due to a failure in the applications to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks. This BID is being retired. TITLE: lemoon "q" Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA18119 VERIFY ADVISORY: http://secunia.com/advisories/18119/ CRITICAL: Less critical IMPACT: Cross Site Scripting WHERE: >From remote SOFTWARE: lemoon 2.x http://secunia.com/product/6564/ DESCRIPTION: r0t has reported a vulnerability in lemoon, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed to the "q" parameter when performing a search isn't properly sanitised before being returned to the user. The vulnerability has been reported in version 2.0 and prior. Other versions may also be affected. SOLUTION: Edit the source code to ensure that input is properly sanitised. PROVIDED AND/OR DISCOVERED BY: r0t ORIGINAL ADVISORY: http://pridels.blogspot.com/2005/12/lemoon-xss-vuln.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2005-4398 // BID: 15949 // VULHUB: VHN-15606 // PACKETSTORM: 42438

AFFECTED PRODUCTS

vendor:mindroutemodel:lemoonscope:eqversion:2.0

Trust: 0.3

vendor:mindroutemodel:damoonscope: - version: -

Trust: 0.3

sources: BID: 15949

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-4398
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200512-441
value: MEDIUM

Trust: 0.6

VULHUB: VHN-15606
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2005-4398
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-15606
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-15606 // CNNVD: CNNVD-200512-441 // NVD: CVE-2005-4398

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-4398

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200512-441

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 42438 // CNNVD: CNNVD-200512-441

EXTERNAL IDS

db:BIDid:15949

Trust: 2.0

db:SECUNIAid:18119

Trust: 1.8

db:NVDid:CVE-2005-4398

Trust: 1.7

db:OSVDBid:21820

Trust: 1.7

db:CNNVDid:CNNVD-200512-441

Trust: 0.7

db:VULHUBid:VHN-15606

Trust: 0.1

db:PACKETSTORMid:42438

Trust: 0.1

sources: VULHUB: VHN-15606 // BID: 15949 // PACKETSTORM: 42438 // CNNVD: CNNVD-200512-441 // NVD: CVE-2005-4398

REFERENCES

url:http://pridels0.blogspot.com/2005/12/lemoon-xss-vuln.html

Trust: 2.0

url:http://www.securityfocus.com/bid/15949

Trust: 1.7

url:http://www.osvdb.org/21820

Trust: 1.7

url:http://secunia.com/advisories/18119

Trust: 1.7

url:http://www.mindroute.us/?id=2452

Trust: 0.6

url:http://pridels0.blogspot.com/2005/12/damoon-xss-vuln.html

Trust: 0.3

url:http://pridels.blogspot.com/2005/12/lemoon-xss-vuln.html

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/6564/

Trust: 0.1

url:http://secunia.com/advisories/18119/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-15606 // BID: 15949 // PACKETSTORM: 42438 // CNNVD: CNNVD-200512-441 // NVD: CVE-2005-4398

CREDITS

rakstija r0t3d3Vil is credited with the discovery of this vulnerability.

Trust: 0.9

sources: BID: 15949 // CNNVD: CNNVD-200512-441

SOURCES

db:VULHUBid:VHN-15606
db:BIDid:15949
db:PACKETSTORMid:42438
db:CNNVDid:CNNVD-200512-441
db:NVDid:CVE-2005-4398

LAST UPDATE DATE

2024-08-14T14:42:12.289000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-15606date:2008-09-20T00:00:00
db:BIDid:15949date:2006-01-17T22:10:00
db:CNNVDid:CNNVD-200512-441date:2006-06-07T00:00:00
db:NVDid:CVE-2005-4398date:2024-08-08T00:15:34.520

SOURCES RELEASE DATE

db:VULHUBid:VHN-15606date:2005-12-20T00:00:00
db:BIDid:15949date:2005-12-19T00:00:00
db:PACKETSTORMid:42438date:2005-12-22T07:01:32
db:CNNVDid:CNNVD-200512-441date:2005-12-20T00:00:00
db:NVDid:CVE-2005-4398date:2005-12-20T11:03:00