lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <471F18AC.2060501@gamasec.net>
Date: Wed, 24 Oct 2007 13:04:28 +0300
From: Fatih Ozavci <securitylists@...onita.gamasec.net>
To: bugtraq@...urityfocus.com
Subject: [GS07-02] RSA Keon Multiple Cross-Site Scripting Vulnerabilities

GS07-02 RSA Keon Multiple Cross-Site Scripting Vulnerabilities

Date & Version : 07/31/2007 - 1.0

Description :

RSA KEON Registration Authority Web Interface has multiple Cross-Site
Scripting Vulnerabilities. Request-spk.xuda and Add-msie-request.xuda
components of RSA KEON are vulnerable to Cross-Site Scripting attacks.
An attacker could use these vulnerabilities for manipulating the
registration information, phising and other client side attacks.

Risk Level : Medium

Impact : Gain Access

Systems Affected :

RSA KEON Registration Authority Software

Remedy :

Contact RSA and visit https://knowledge.rsasecurity.com for remediation.

Credits :

Fatih Ozavci (GamaTEAM Member)
Caglar Cakici (GamaTEAM Member)
It's detected using GamaSEC Exploit Framework
GamaSEC.net Security Solutions (www.gamasec.net)

Original Advisory Link :

http://www.gamasec.net/english/gs07-02.html

References :

1. CERT - Vulnerability Note VU#342793

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ