[] NeoSense

SurfControl SuperScout Email Filter 3.5 - 'MsgError.asp' Cross-Site Scripting

Author: ken@FTU
type: webapps
platform: asp
port: 
date_added: 2002-10-08 
date_updated: 2012-10-12 
verified: 1 
codes: CVE-2002-1529;OSVDB-9210 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/5928/info

SurfControl SuperScout Email Filter comes with a web-based interface to provide remote access to administrative facilities.

The web-based admin interface is prone to cross-site scripting attacks.

It is possible to create a link containing malicious HTML and script code to certain pages in the interface. When this link is visited by a web user, the attacker-supplied script code will execute in user's web client in the security context of the web interface.

This may potentially be exploited to steal cookie-based authentication credentials from legitimate users of the interface.

http://www.example.com/web/msgError.asp?Redirect=loginhtm&Reason=<script>alert(document.cookie);</script>