Domino Sametime Multiple Reflected Cross-Site Scripting

2011-02-22 / 2011-02-23
Credit: Dave Daly
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Class Input Validation Error CVE CVE-2011-1038 Remote Yes Local No Published Feb 16 2011 09:33AM Credit Dave Daly Vulnerable Domino Sametime 8.0.1 Domino Sametime is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Domino Sametime 8.0.1 is known to be vulnerable. Other versions may also be vulnerable. To exploit this issue, an attacker must entice an unsuspecting victim into following a malicious URI, such as the following: http://host/stconf.nsf/WebMessage?OpenView&messageString="><script>alert ("XSS!")</script># http://host/stconf.nsf/");} alert("XSS!"); function a(){ var a=unescape(" It is currently unknown whether vendor updates are available for this issue.

References:

http://www.securityfocus.com/bid/46471
http://www.securityfocus.com/archive/1/archive/1/516563/100/0/threaded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top