InSite Troubleshooting Cross-Site Scripting

2011.03.17
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Class Input Validation Error CVE Remote Yes Local No Published Feb 14 2011 08:55AM Credit Dionach Vulnerable Kodak InSite 5.5.2 Kodak InSite is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Kodak InSite 5.5.2 is known to be vulnerable. Other versions may also be vulnerable. To exploit this issue, an attacker must entice an unsuspecting victim into following a malicious URI, such as the following: http://SITE/Troubleshooting/DiagnosticReport.asp?HeaderWarning=<script>a lert("XSS!")</script>&Language=en&rflp=true# POST http://SITE/troubleshooting/speedtest.asp User-Agent= Test";} alert("XSS!"); function a() {// Kodak report that this issue does not affect the latest version of InSite, available for free with an ongoing support contract.

References:

http://xforce.iss.net/xforce/xfdb/65941
http://www.securityfocus.com/bid/46762
http://www.securityfocus.com/archive/1/archive/1/516881/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/516880/100/0/threaded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top