Project Open Cross Site Scripting

2012-02-04 / 2012-02-09
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

# # Vulnerability Title: Project Open ]po[ - "account-closed.tcl" Reflective Cross Site Scripting # Author: Michail Poultsakis # Date of Vendor and CERT Contact: 2011.12.08 # Publication Date: 2012.02.02 # Product Link: http://www.project-open.com # Affected Product Version: 3.4.x # # # # Project Open ]po[ version 3.4.x suffers from a reflective Cross Site Scripting Vulnerability. # The vulnerability resides within the "message" parameter in the "account-closed.tcl" script. # # http://[HOST]/register/account-closed?message=[arbitrary-JavaScript] # # An attacker, by crafting a malicious URL of his choosing, may force arbitrary JavaScript to be executed on the victim's browser. # # --- Vulnerability detected on product version 3.4. Previous product versions might also be affected. --- #

References:

Project Open


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top