Doesn't appear to be highly critical. Details below.... TITLE: WhatsUp Gold "map.asp" Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA16792 VERIFY ADVISORY: http://secunia.com/advisories/16792/ CRITICAL: Less critical IMPACT: Cross Site Scripting WHERE: From local network SOFTWARE: Ipswitch WhatsUp Gold 8.x http://secunia.com/product/3839/ DESCRIPTION: Dennis Rand has discovered a vulnerability in WhatsUp Gold, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed to the "map" parameter in "map.asp" isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. The vulnerability has been confirmed in version 8.03 and reported in version 8.04. Other versions may also be affected. NOTE: It is also possible to disclose the source code of the ASP files on the webserver by using uppercase extensions (e.g. map.ASP). SOLUTION: Edit the source code to ensure that input is properly sanitised. PROVIDED AND/OR DISCOVERED BY: Dennis Rand ORIGINAL ADVISORY: Cirt.dk: http://cirt.dk/advisories/cirt-34-advisory.pdf http://cirt.dk/advisories/cirt-35-advisory.pdf ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
-----Original Message----- From: Bryan Harrell [mailto:[EMAIL PROTECTED] Sent: Friday, September 16, 2005 9:29 AM To: [email protected] Subject: RE: [WhatsUp Forum] WhatsUp with this forum? Jim, What vulnerability are you speaking about and what IPSwitch product is this vulnerability on (WUG or WUP)? >>> [EMAIL PROTECTED] 09/14/2005 9:31:08 AM >>> I am new to the list, but I was hoping for some information or a update on when a patch will be released for the vulnerability reported Monday. Has anyone heard anything? Jim Please visit http://www.ipswitch.com/support/mailing-lists.html to be removed from this list. An Archive of this list is available at: http://www.mail-archive.com/whatsup_forum%40list.ipswitch.com/
