{"vuid":"VU#366372","idnumber":"366372","name":"RSA Authentication Agent for Web fails to properly validate input","keywords":["RSA Authentication Agent","Web","IIS","cross-site scripting","css","postdata parameter","/WebID/IISWebAgentIF.dll"],"overview":"The RSA Authentication Agent for Web running on Microsoft Internet Information Services (IIS) does not properly validate input that is passed to the \"postdata\" parameter in \"/WebID/IISWebAgentIF.dll\" and may allow an attacker to execute code in a user's browser.","clean_desc":"RSA Authentication Agent for Web for IIS fails to filter HTML from HTTP POST request input in the \"postdata\" parameter and may allow a cross-site scripting attack. A remote attacker may be able to insert code which will run from the site running RSA Authentication Agent for Web for IIS and be executed on the target user's web browser.","impact":"A remote attacker may be able to execute code and script code in a user's browser. The attacker may thus be able to impersonate the target user or read protected cookies and data from the target user's web browser, among other possibilities.","resolution":"Apply An Update This issue has been addressed in RSA Authentication Agent for Web for IIS version 5.3.","workarounds":"","sysaffected":"","thanks":"Thanks to Oliver Karow for reporting this vulnerability.","author":"This document was written by Ken MacInnis.","public":["http://www.oliverkarow.de/research/rsaxss.txt","http://secunia.com/advisories/14954/","http://securitytracker.com/alerts/2005/Apr/1013724.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1118"],"cveids":["CVE-2005-1118"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-04-18T20:24:41Z","publicdate":"2005-04-15T00:00:00Z","datefirstpublished":"2005-06-07T18:19:41Z","dateupdated":"2005-06-07T18:19:48Z","revision":4,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"14","cam_impact":"5","cam_easeofexploitation":"2","cam_attackeraccessrequired":"15","cam_scorecurrent":"0.7875","cam_scorecurrentwidelyknown":"0.984375","cam_scorecurrentwidelyknownexploited":"1.771875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.7875,"vulnote":null}