lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20080529194430.21699.qmail@securityfocus.com> Date: 29 May 2008 19:44:30 -0000 From: DoZ@...kersCenter.com To: bugtraq@...urityfocus.com Subject: XEROX DocuShare URL XSS Injection Vulnerabilities XEROX DocuShare URL XSS Injection Vulnerabilities Xerox DocuShare is a flexible Web-based content management solution that brings greater productivity to every knowledge worker. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Hackers Center Security Group (http://www.hackerscenter.com) Credit: Doz Class: Cross Site Scripting Remote: Yes Product: DocuShare Vendor: http://docushare.xerox.com/ Version: 6 & Previous Attackers can exploit these issues via a web client. http://docushare.site.com/dsdn/dsweb/SearchResults/XSS http://docushare.site.com/dsdn/dsweb/Services/User-XSS http://docushare.site.com/docushare/dsweb/ServicesLib/Group-#/XSS Google Dork: DocuShare Login