Index
Bugtraq
Pełna lista
Błędy
Sztuczki
Exploity
Dorks list
Tylko z CVE
Tylko z CWE
Bogus
Ranking
CVEMAP
Świeża lista CVE
Producenci
Produkty
Słownik CWE
Sprawdź nr. CVE
Sprawdź nr. CWE
Szukaj
W Bugtraq
W bazie CVE
Po autorze
Po nr. CVE
Po nr. CWE
Po producencie
Po produkcie
RSS
Bugtraq
CVEMAP
CVE Produkty
Tylko Błędy
Tylko Exploity
Tylko Dorks
Więcej
cIFrex
Facebook
Twitter
Donate
O bazie
Lang
Polish
English
Submit
jPlayer 2.2.19 XSS
2013.04.11
Credit:
Kurt Seifried
Risk:
Low
Local:
No
Remote:
Yes
CVE:
CVE-2013-1942
CWE:
CWE-79
Ogólna skala CVSS:
4.3/10
Znaczenie:
2.9/10
Łatwość wykorzystania:
8.6/10
Wymagany dostęp:
Zdalny
Złożoność ataku:
Średnia
Autoryzacja:
Nie wymagana
Wpływ na poufność:
Brak
Wpływ na integralność:
Częściowy
Wpływ na dostępność:
Brak
ownCloud brought this to my intention (they use it, I'm guessing other people use it as well. https://github.com/happyworm/jPlayer/commit/e8ca190f7f972a6a421cb95f09e138720e40ed6d Please use CVE-2013-1942 for this issue. The only contact info I can find is hello () happyworm com for upstream. 8 8 * - http://www.gnu.org/copyleft/gpl.html 9 9 * 10 10 * Author: Mark J Panaghiston 11 - * Version: 2.2.19 12 - * Date: 29th January 2013 11 + * Version: 2.2.20 12 + * Date: 21st March 2013 13 13 * 14 14 * FlashVars expected: (AS3 property of: loaderInfo.parameters) 15 15 * id: (URL Encoded: String) Id of jPlayer instance ... ... @@ -70,7 +70,7 @@ package { 70 70 private var isVideo:Boolean = false; 71 71 72 72 private var securityIssue:Boolean = false; // When SWF parameters contain illegal characters 73 - private var directAccess:Boolean = false; // When SWF visited directly with no parameters 73 + private var directAccess:Boolean = false; // When SWF visited directly with no parameters (or when security issue detected) 74 74 75 75 private var txLog:TextField; 76 76 private var debug:Boolean = false; // Set debug to false for release compile! ... ... @@ -233,12 +233,12 @@ package { 233 233 } 234 234 i++; 235 235 } 236 - if(i === 0) { 236 + if(i === 0 || securityIssue) { 237 237 directAccess = true; 238 238 } 239 239 } 240 240 private function illegalChar(s:String):Boolean { 241 - var illegals:String = "' \" ( ) { } * + /"; 241 + var illegals:String = "' \" ( ) { } * + / \\ < > = document"; 242 242 if(Boolean(s)) { // Otherwise exception if parameter null. 243 243 for each (var illegal:String in illegals.split(' ')) { 244 244 if(s.indexOf(illegal) >= 0) {
Referencje:
https://github.com/happyworm/jPlayer/commit/e8ca190f7f972a6a421cb95f09e138720e40ed6d
http://seclists.org/oss-sec/2013/q2/82
See this note in RAW Version
Tweet
Vote for this issue:
0
0
50%
50%
Thanks for you vote!
Thanks for you comment!
Your message is in quarantine 48 hours.
Comment it here.
Nick (*)
Email (*)
Video
Text (*)
(*) -
required fields.
Cancel
Submit
{{ x.nick }}
|
Date:
{{ x.ux * 1000 | date:'yyyy-MM-dd' }}
{{ x.ux * 1000 | date:'HH:mm' }}
CET+1
{{ x.comment }}
Show all comments
Copyright
2024
, cxsecurity.com
Back to Top