Re: [Plugins-writers] compaqdiag and false positives

From: Michel Arboi (mikhail@private)
Date: Sat Feb 19 2005 - 06:43:17 PST


On Thu, 2005-02-17 at 08:56 -0800, Jon Passki wrote:
> <head><META HTTP-EQUIV="refresh"
> CONTENT="0;URL=https://192.168.118.33:2381/_vti_pvt%5caccess.cnf"></head><H2>Unable
> to complete your request due to added security features</H2>

So it _is_ vulnerable to XSS.
The problem is elsewhere: as this is a generic XSS, the message should
appear only once.
This happens when cross_site_scripting.nasl missed the flaw for whatever
reason (network glitch?)


_______________________________________________
Plugins-writers mailing list
Plugins-writers@private
http://mail.nessus.org/mailman/listinfo/plugins-writers



This archive was generated by hypermail 2.1.3 : Sat Feb 19 2005 - 06:44:36 PST