lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 27 Sep 2017 15:58:44 +0200 From: Marcin Wołoszyn <mw@....pl> To: fulldisclosure@...lists.org Subject: [FD] OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) - Cross-Site Scripting Title: OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) - Cross-Site Scripting Author: Marcin Woloszyn Date: 27. September 2017 CVE: CVE-2017-14756 Affected Software: ================== OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) Exploit was tested on: ====================== v4.5SP1 Patch 13 (older versions might be affected as well) Cross-Site Scripting (User Interaction): ======================================== It is possible to inject Javascript into the application which will be reflected to unaware application users upon certain interaction with the application. This might allow an attacker to perform actions on behalf of unaware application users. In order to remediate the issue, proper input validation, sanitizing and output encoding should be conducted on server side. No CSRF token is necessary for exploitation. Vector : -------- 1) visit https://[...]/xAdmin/html/Deployment?show=true&cat_id=501egdkn'%2balert(1)//&show=true 2) click on "xPresso Documents" - XSS is triggered. Fix: ==== https://knowledge.opentext.com/knowledge/llisapi.dll/Open/68982774 Contact: ======== mw[at]nme[dot]pl _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists