ZX Java Framework Cross Site Scripting

2013.11.18
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

##################################################################### # # COMPASS SECURITY ADVISORY - http://www.csnc.ch/ # ##################################################################### # # CVE ID : CVE-2013-5966 # CSNC ID: CSNC-2013-023 # Product: ZK Framework # Vendor: Potix Corporation # Subject: Cross-site Scripting - XSS # Risk: High # Effect: Remotely exploitable # Author: Stephan Rickauer (stephan.rickauer@csnc.ch) # Date: November 15th 2013 # ##################################################################### Introduction: ------------- Compass Security AG discovered a security flaws in the ZK Java Framework. Vulnerable: ----------- - ZK Framework versions prior version 5.0.13 Patches: -------- Version 5.0.13 has this issue fixed. Description: ------------ The ZK Framework does not properly encode output of user data in certain places. Exploiting this vulnerability leads to so-called cross-site scripting (XSS) and allows execution of JavaScript code in the context of the user's session, e.g. to impersonate logged-in ZK Framework users. Milestones: ----------- 2013-09-11 Vulnerability discovered 2013-09-27 Acknowledgement of vulnerability by vendor 2013-09-27 Release of ZK patch 2013-09-30 CVE-ID requested and assigned by MITRE 2013-10-08 Public availability of patched ZK release 5.0.13 2013-11-15 Public release of this advisory References: ----------- http://www.zkoss.org/product/zk https://github.com/zkoss/zk/blob/v5.0.13/zkdoc/release-note ZK internal identifier: ZK-1961

References:

http://www.zkoss.org/product/zk
https://github.com/zkoss/zk/blob/v5.0.13/zkdoc/release-note


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top