{"vuid":"VU#311644","idnumber":"311644","name":"pd-admin contains cross-site scripting vulnerabilities","keywords":["pd-admin","xss","cwe-79"],"overview":"pd-admin, a web interface for users of hosting providers, is susceptible to cross-site scripting (XSS) vulnerabilities.","clean_desc":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') pd-admin, contains cross-site scripting (XSS) vulnerabilities. The vulnerability report provided by Thomas Roth states: Reflective cross-site scripting\nWhen pasting the string below into the 'Create new directory' textfield (found under 'WebFTP' -> 'Overview'), the error page will include the attacker supplied JavaScript code. \"><script>alert(\"XSS\");</script> Stored cross-site scripting\nWhen storing the string below as the body for an e-mail autoresponder, every time someone tries to change the text of the autoresponder, the attacker supplied JavaScript code will execute. By tricking a (higher privileged) support contact into looking at it, the attacker might be able to steal the support contact's session cookie. </textarea> <script> alert(\"XSS\");</script>","impact":"An attacker may be able to exploit the cross-site scripting vulnerability to result in information leakage, privilege escalation, and/or denial of service on the host computer.","resolution":"Apply an Update pd-admin 4.17 has been released to address these vulnerabilities.","workarounds":"Restrict access As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the web interface using stolen credentials from a blocked network location.","sysaffected":"","thanks":"Thanks to Thomas Roth for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["http://www.pdadmin-forum.de/thread.php?threadid=4051","http://www.pd-admin.de/","http://cwe.mitre.org/data/definitions/79.html"],"cveids":["CVE-2013-0129"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-03-08T17:33:32Z","publicdate":"2013-03-08T00:00:00Z","datefirstpublished":"2013-04-15T19:51:38Z","dateupdated":"2013-04-15T20:11:05Z","revision":18,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"UC","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4.3","cvss_basevector":"AV:N/AC:M/Au:N/C:N/I:P/A:N","cvss_temporalscore":"3.9","cvss_environmentalscore":"2.9","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}