Summary
The host is running LilHTTP Web Server and is prone to cross site scripting vulnerability
Impact
Successful exploitation will allow attackers to plant XSS backdoors and inject arbitrary SQL statements via crafted XSS payloads.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaw is caused by improper validation of user-supplied input, passed in the 'name' and 'email' parameter in 'cgitest.html', when handling the 'CGI Form Demo' application.
Affected
LilHTTP Server version 2.2 and prior.
References
Severity
Classification
-
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Apache Tomcat 'sort' and 'orderBy' Parameters Cross Site Scripting Vulnerabilities
- httpdASM Directory Traversal Vulnerability
- Apache HTTP Server mod_proxy_ajp Process Timeout DoS Vulnerability (Windows)
- Apache Tomcat Hash Collision Denial Of Service Vulnerability
- IBM WebSphere Application Server (WAS) Multiple Vulnerabilities 01 - March 2011