SurfControl SuperScout Email Filter 3.5 - 'MsgError.asp' Cross-Site Scripting
Author: ken@FTU
type: webapps
platform: asp
port:
date_added: 2002-10-08
date_updated: 2012-10-12
verified: 1
codes: CVE-2002-1529;OSVDB-9210
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/5928/info
SurfControl SuperScout Email Filter comes with a web-based interface to provide remote access to administrative facilities.
The web-based admin interface is prone to cross-site scripting attacks.
It is possible to create a link containing malicious HTML and script code to certain pages in the interface. When this link is visited by a web user, the attacker-supplied script code will execute in user's web client in the security context of the web interface.
This may potentially be exploited to steal cookie-based authentication credentials from legitimate users of the interface.
http://www.example.com/web/msgError.asp?Redirect=loginhtm&Reason=<script>alert(document.cookie);</script>