---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Nikto "Server" Header Script Insertion Vulnerability SECUNIA ADVISORY ID: SA16669 VERIFY ADVISORY: http://secunia.com/advisories/16669/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting WHERE: >From remote SOFTWARE: Nikto 1.x http://secunia.com/product/5647/ DESCRIPTION: Mariano Nunez Di Croce has reported a vulnerability in Nikto, which can be exploited by malicious people to conduct script insertion attacks. The vulnerability is cause due to a lack of sanitation of the Server Header value returned in the HTTP response from a web site before using it to generate a HTML-based vulnerability report. This can be exploited to execute arbitrary HTML and script code in the "My Computer" zone when the vulnerability report is viewed. Successful exploitation requires that the user is tricked into scanning a malicious web site. The vulnerability has been reported in versions 1.35 and prior. SOLUTION: Version 1.35 will display a warning message if HTML output is requested. However, this does not fully address the vulnerability. Do not view HTML vulnerability reports generated from scanning untrusted web sites. PROVIDED AND/OR DISCOVERED BY: Mariano Nunez Di Croce, Cybsec S.A. ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------