IBM ENOVIA SmarTeam v5 Cross Site Scripting Vulnerability

2010-03-14 / 2010-03-15
Credit: lament
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

========================================= Yaniv Miron aka "Lament" Advisory March 7, 2010 IBM ENOVIA SmarTeam v5 Cross Site Scripting Vulnerability ========================================= ===================== I. BACKGROUND ===================== ENOVIA SmarTeam provides highly flexible product data management and mission-critical business process management. It helps your team optimally leverage product knowledge, driving collaboration across the enterprise and value chain. http://www-01.ibm.com/software/applications/plm/smarteam/ ===================== II. DESCRIPTION ===================== A malicious attacker may inject scripts into the IBM ENOVIA SmarTeam application. ===================== III. ANALYSIS ===================== Exploitation of this vulnerability results in the execution of arbitrary code using a malicious link. ===================== IV. EXPLOIT ===================== http://example.com/WebEditor/Authentication/LoginPage.aspx?ReturnUrl=%2f WebEditor%2fDefault.aspx&errMsg=User+is+locked.+Too+many+logon+attempts. "><script>alert('XSS-By-Lament')</script> ===================== V. DISCLOSURE TIMELINE ===================== Jan 2009 Vulnerability Found Jan 2009 Vendor Notification March 2010 Public Disclosure ===================== VI. CREDIT ===================== Yaniv Miron aka "Lament". lament (at) ilhack (dot) org [email concealed]

Referencje:

http://www.securityfocus.com/bid/38612
http://www.securityfocus.com/archive/1/archive/1/509975/100/0/threaded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top