Microsoft TSAC ActiveX connect.asp cross-site scripting
|ms-tsac-connect-xss (10342)||Medium Risk|
Microsoft Terminal Services Advanced Client (TSAC) ActiveX control allows user?s to run Terminal Services sessions within Internet Explorer. The TSAC Web package and Remote Desktop Web Connection are vulnerable to cross-site scripting, caused by improper filtering of user-supplied input by the connect.asp script. A remote attacker could create a specially-crafted URL request to the connect.asp script containing malicious script, which would be executed in another user's Web browser in the security context of the host, once the link is clicked.
Web administrator's should obtain the updated TSAC ActiveX control, as listed in Microsoft Security Bulletin MS02-046. See References.
- Microsoft Security Bulletin MS00-046: Buffer Overrun in TSAC ActiveX Control Might Allow Code Execution.
- SNS Advisory No.56: TSAC Web package/IIS 5.1 connect.asp Cross-site Scripting Vulnerability.
- BID-5952: Microsoft TSAC ActiveX Control Cross Site Scripting Vulnerability
- CVE-2002-1795: Cross-site scripting (XSS) vulnerability in connect.asp in Microsoft Terminal Services Advanced Client (TSAC) ActiveX control allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
- OSVDB ID: 37148: Microsoft TSAC ActiveX connect.asp Unknown XSS
- Microsoft Internet Information Server 5.1
- Microsoft Windows
Oct 11, 2002
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this