Doesn't appear to be highly critical. Details below....

TITLE: WhatsUp Gold "map.asp" Cross-Site Scripting Vulnerability
SECUNIA ADVISORY ID: SA16792
VERIFY ADVISORY: http://secunia.com/advisories/16792/
CRITICAL: Less critical
IMPACT: Cross Site Scripting
WHERE: From local network
SOFTWARE: Ipswitch WhatsUp Gold 8.x
http://secunia.com/product/3839/
DESCRIPTION: Dennis Rand has discovered a vulnerability in WhatsUp Gold,
which can be exploited by malicious people to conduct cross-site
scripting attacks. Input passed to the "map" parameter in "map.asp"
isn't properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's browser
session in context of an affected site. The vulnerability has been
confirmed in version 8.03 and reported in version 8.04. Other versions
may also be affected. NOTE: It is also possible to disclose the source
code of the ASP files on the webserver by using uppercase extensions
(e.g. map.ASP).
SOLUTION: Edit the source code to ensure that input is properly
sanitised.
PROVIDED AND/OR DISCOVERED BY: Dennis Rand
ORIGINAL ADVISORY: Cirt.dk:
http://cirt.dk/advisories/cirt-34-advisory.pdf
http://cirt.dk/advisories/cirt-35-advisory.pdf
----------------------------------------------------------------------
About: This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


-----Original Message-----
From: Bryan Harrell [mailto:[EMAIL PROTECTED] 
Sent: Friday, September 16, 2005 9:29 AM
To: [email protected]
Subject: RE: [WhatsUp Forum] WhatsUp with this forum?

Jim,

What vulnerability are you speaking about and what IPSwitch product is
this vulnerability on (WUG or WUP)?

>>> [EMAIL PROTECTED] 09/14/2005 9:31:08 AM >>>
I am new to the list, but I was hoping for some information or a update
on when a patch will be released for the vulnerability reported Monday.
Has anyone heard anything?

Jim



Please visit http://www.ipswitch.com/support/mailing-lists.html
to be removed from this list.

An Archive of this list is available at:
http://www.mail-archive.com/whatsup_forum%40list.ipswitch.com/

Reply via email to