A vulnerability was found in Microsoft MSN. It has been classified as problematic. Affected is an unknown function of the file results.aspx. The manipulation leads to basic cross site scripting. Using CWE to declare the problem leads to CWE-80. The weakness was released 07/17/2003 by Marc Ruef with scip AG (Website). The advisory is available at scip.ch. It is possible to launch the attack remotely. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment. This vulnerability is assigned to T1059.007 by the MITRE ATT&CK project. It is declared as proof-of-concept. The exploit is shared for download at search.msn.ch. As 0-day the estimated underground price was around $5k-$25k. The vulnerability scanner Nessus provides a plugin with the ID 11492 (Sambar Server Multiple Script XSS), which helps to determine the existence of the flaw in a target environment. The bugfix is ready for download at search.msn.ch. A possible mitigation has been published before and not just after the disclosure of the vulnerability. Attack attempts may be identified with Snort ID 1497. The vulnerability is also documented other vulnerability databases: Tenable (11492).
Timeline
The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.
40 more entries are not shown