Microsoft Content Management Server (MCMS) ManualLogin.asp REASONTXT cross-site scripting
|mcms-manuallogin-reasontxt-xss (10318)||Medium Risk|
Microsoft Content Management Server (MCMS) is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the ManualLogin.asp script. A remote attacker could create a specially-crafted URL request to the ManualLogin.asp script containing malicious script embedded within the REASONTXT parameter, which would be executed in the victim's Web browser within the security context of the MCMS server, once the victim attempts to login. An attacker could use this vulnerability to modify Web content, hijack a user's session and steal their personal information, spoof Web pages, or access the targeted Web sites cookies.
Apply the patch for this vulnerability, as listed in Microsoft Security Bulletin MS03-002. See References.
- BugTraq Mailing List, Mon Oct 07 2002 - 18:45:41 CDT : CSS on Microsoft Content Management Server .
- CIAC Information Bulletin N-034: Cumulative Patch for Microsoft Content Management Server.
- Microsoft Security Bulletin MS03-002: Cumulative Patch for Microsoft Content Management Server (810487).
- BID-5922: Microsoft Content Management Server 2001 Cross-Site Scripting Vulnerability
- BID-6668: Microsoft Content Management Server Cross-Site Scripting Vulnerability
- CVE-2003-0002: Cross-site scripting vulnerability (XSS) in ManualLogin.asp script for Microsoft Content Management Server (MCMS) 2001 allows remote attackers to execute arbitrary script via the REASONTXT parameter.
- OSVDB ID: 9207: Microsoft Content Management ManualLogin.asp REASONTXT Parameter XSS
- Microsoft Content Management Server 2001
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server
Oct 07, 2002
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this