lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4uY2WINFbY-aGiyDyx4imj5OTzBDPjOWJRMP6aI5opFj14omMfGGi12CDKP8Z5cVa4jG6NesSChSXzEQlvbkya8Ew5JGP7g1msmui0IH3a8=@protonmail.com> Date: Thu, 26 Mar 2020 11:14:20 +0000 From: Georg Ph E Heise via Fulldisclosure <fulldisclosure@...lists.org> To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org> Subject: [FD] CVE-2019-19913 codeBeamer – Stored Cross-Site Scripting =============================================================================== Identifiers ------------------------------------------------- * CVE-2019-19913 CVSSv3 score ------------------------------------------------- 6.4 ([AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H&version=3.1)) Vendor ------------------------------------------------- Intland – Codebeamer (https://codebeamer.com) Product ------------------------------------------------- codeBeamer ALM is a holistically integrated, collaborative Application Lifecycle Management platform with capabilities that cover your entire product development lifecycle. Affected versions ------------------------------------------------- - codebeamer 9.5 and below Credit ------------------------------------------------- Georg Ph E Heise (@gpheheise) / Lufthansa Industry Solutions (@LHIND_DLH) Vulnerability summary ------------------------------------------------- Intland Software has a stored XSS vulnerability in their CodeBeamer 9.5 ALM Tackers Title parameter. Technical details ------------------------------------------------ The Tackers Heading is vulnerable to a stored cross site scripting (XSS) attack An Attacker has to create or modify a Tracker Heading with a direct XSS to exploit any project user who's viewing the Tracker or the Tracker notes. Proof of concept ------------------------------------------------- The following evidence is provided to illustrate the existence and exploitation: Create a release with the heading similar to this <script> alert(‘hacked’)</script> ` Solution ------------------------------------------------- Contact vendor for a solution Timeline ------------------------------------------------- Date | Status ------------|----------------------------- 20-DEZ-2019 | Reported to vendor 03-JAN-2020 | Acknowledged by vendor 09-MAR-2020 | Patch available 26-MAR-2020 | Public disclosure _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists