lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: 21 Feb 2011 08:45:17 -0000 From: david.daly@...nach.com To: bugtraq@...urityfocus.com Subject: Domino Sametime Multiple Reflected Cross-Site Scripting Class Input Validation Error CVE CVE-2011-1038 Remote Yes Local No Published Feb 16 2011 09:33AM Credit Dave Daly Vulnerable Domino Sametime 8.0.1 Domino Sametime is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Domino Sametime 8.0.1 is known to be vulnerable. Other versions may also be vulnerable. To exploit this issue, an attacker must entice an unsuspecting victim into following a malicious URI, such as the following: http://host/stconf.nsf/WebMessage?OpenView&messageString="><script>alert("XSS!")</script># http://host/stconf.nsf/");} alert("XSS!"); function a(){ var a=unescape(" It is currently unknown whether vendor updates are available for this issue.
Powered by blists - more mailing lists