*CVE-2014-7293 Ex Libris Patron Directory Services (PDS) XSS (Cross-Site
Scripting) Security Vulnerability*
Exploit Title: Ex Libris Patron Directory Services (PDS) Logon Page url
Parameter XSS
Product: Ex Libris Patron Directory Services (PDS)
Vendor: Ex Libris
Vulnerable Versions: 2.1 and probability prior
Tested Version: 2.1
Advisory Publication: DEC 29, 2014
Latest Update: DEC 29, 2014
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: CVE-2014-7293
Risk Level: Medium
CVSS v2 Base Score: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend)
Credit: Wang Jing [CCRG, Nanyang Technological University (NTU), Singapore]
*Advisory Details:*
*(1) Vendor URL:*
http://www.exlibrisgroup.org/display/CrossProductCC/PDS+OpenSSO+Integration
*Product Description:*
“Ex Libris is a leading worldwide developer and provider of
high-performance applications for libraries, information centres, and
researchers.”
Patron Directory Services (PDS) module was provides a seamless single
sign-on (SSO) environment for all Ex Libris products. such as, Aleph,
Metalib, Primo, DigiTool, Rosetta …
It is one of the largest library management system which is used by large
numbers of universities and institutions.
*(2) Vulnerability Details:*
However, Patron Directory Services (PDS) can be exploited by XSS Attacks.
*(2.1) *The vulnerability occurs at “PDS” service’s logon page, with “&url” parameter,
*References:*
http://tetraph.com/security/cves/cve-2014-7293-ex-libris-patron-directory-services-pds-xss-cross-site-scripting-security-vulnerability/
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7293