Radvision's Scopia Cross Site Scripting Vulnerabilities

2009-08-24 / 2009-08-25
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

Radvision's Scopia Cross Site Scripting Vulnerabilities *********************************************************************** Author: Francesco Bianchino contact: f.bianchino at gmail dot com Product: Radvision's Scopia Version: 5.7 Vendor Site: http://www.radvision.com Product Support Page: http://www.radvision.com/Support/SCOPIA-57-Support/ *********************************************************************** Summary Radvision's Scopia provides a solution for voice and video collaborative communications. *********************************************************************** Vulnerability Detail The web-based interface is exposed to an XSS attack, the index.jsp page does not check the user's input and is possible to inject arbitrary code into the page parameters. It's possible to steal user's cookie or other data sending a malicious crafted URL to authenticated user. *********************************************************************** PoC http://www.example.com/scopia/entry/index.jsp?page=play%3c%2fsCrIpT%3e%3csCrIpT%3ealert("document.cookie")%3c%2fsCrIpT%3e *********************************************************************** Solution Radvision has fixed the issue in SD 7.0.100 and later version. *********************************************************************** Credits Discovered and advised to Radvision, August 2009 by Francesco Bianchino.

Referencje:

http://www.securityfocus.com/archive/1/archive/1/506013/100/0/threaded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top