VDB-186 · Snort 1497

Microsoft MSN results.aspx cross site scripting

A vulnerability was found in Microsoft MSN. It has been classified as problematic. Affected is an unknown function of the file results.aspx. The manipulation leads to basic cross site scripting. Using CWE to declare the problem leads to CWE-80. The weakness was released 07/17/2003 by Marc Ruef with scip AG (Website). The advisory is available at scip.ch. It is possible to launch the attack remotely. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment. This vulnerability is assigned to T1059.007 by the MITRE ATT&CK project. It is declared as proof-of-concept. The exploit is shared for download at search.msn.ch. As 0-day the estimated underground price was around $5k-$25k. The vulnerability scanner Nessus provides a plugin with the ID 11492 (Sambar Server Multiple Script XSS), which helps to determine the existence of the flaw in a target environment. The bugfix is ready for download at search.msn.ch. A possible mitigation has been published before and not just after the disclosure of the vulnerability. Attack attempts may be identified with Snort ID 1497. The vulnerability is also documented other vulnerability databases: Tenable (11492).

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

148

Field

cna_nocve1
cna_responsible1
source_nessus_risk1
source_nessus_filename1
vulnerability_cwe1

Commit Conf

100%47
90%8
98%3
70%2

Approve Conf

100%47
90%8
98%3
70%2
IDCommitedUserFieldChangeRemarksAcceptedStatusC
1258051106/04/2022VulD...nocve106/04/2022accepted
100
1258051006/04/2022VulD...responsibleVulDB06/04/2022accepted
100
1100837003/08/2021VulD...nessus_riskMediumtenable.com03/08/2021accepted
70
1100836903/08/2021VulD...nessus_filenamesambar_xss.nasltenable.com03/08/2021accepted
70
1272810/08/2018VulD...cwe80 (cross site scripting)10/08/2018accepted
90
1272010/08/2018VulD...nessus_familyCGI abuses : XSStenable.com10/08/2018accepted
100
1271910/08/2018VulD...nessus_nameSambar Server Multiple Script XSStenable.com10/08/2018accepted
100
1273507/17/2003VulD...cvss3_vuldb_rcXsee CVSS documentation07/17/2003accepted
90
1273407/17/2003VulD...cvss3_vuldb_rlOsee CVSS documentation07/17/2003accepted
90
1273307/17/2003VulD...cvss3_vuldb_ePsee CVSS documentation07/17/2003accepted
90
1273207/17/2003VulD...cvss2_vuldb_rcNDsee CVSS documentation07/17/2003accepted
90
1273107/17/2003VulD...cvss2_vuldb_rlOFsee CVSS documentation07/17/2003accepted
90
1273007/17/2003VulD...cvss2_vuldb_ePOCsee CVSS documentation07/17/2003accepted
90
1272907/17/2003VulD...locationWebsite07/17/2003accepted
90
1272707/17/2003VulD...expertDa Microsoft unverzüglich nach dem Auffinden der Schwachstelle über das Vorhandensein derer informiert wurde, konnten sie schnellstens eine Lösung umsetzen. Dies haben sie auch getan, wodurch das Zeitfenster erfolgreicher Angriffe so gering wie möglich gehalten wurde.07/17/2003accepted
100
1272607/17/2003VulD...descriptionMSN search ist ein Link-Verzeichnis, das durch Microsoft administriert wird. Es wurde eine Cross Site Scripting-Verwundbarkeit im Skript results.aspx, das die Resultate einer Suchabfrage ausgibt, entdeckt. Microsoft wurde umgehend über die Schwachstelle informiert und behob den Fehler innerhalb einer Woche. Danach wurde das entsprechende Advisory von der scip AG freigegeben.07/17/2003accepted
100
1272507/17/2003VulD...affectedhttp://search.msn.ch07/17/2003accepted
100
1272407/17/2003VulD...titleMSN search results.aspx Cross Site Scripting07/17/2003accepted
100
1272307/17/2003VulD...seealso83 93 104 107 110 111 109 157 140 141 139 142 177 187 242 267 296 311 334 335 360 388 397 412 469 482 8873407/17/2003accepted
100
1272207/17/2003VulD...mischttp://www.cgisecurity.com/articles/xss-faq.shtml07/17/2003accepted
100

40 more entries are not shown

Do you need the next level of professionalism?

Upgrade your account now!