Multiple cross-site scripting (XSS) vulnerabilities in Xerox DocuShare 6 and earlier allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI under (1) SearchResults/ and (2) Services/ in dsdn/dsweb/, and (3) the default URI under unspecified docushare/dsweb/ServicesLib/Group-#/ directories.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/492766/100/0/threaded | mailing list |
http://www.securityfocus.com/archive/1/492960/100/0/threaded | mailing list |
https://docushare.xerox.com/doug/dsweb/Get/Document-20353/SA30426-workaround.html | vendor advisory |
http://www.securityfocus.com/bid/29430 | vdb entry |
http://www.vupen.com/english/advisories/2008/1701/references | vdb entry |
http://www.securitytracker.com/id?1020147 | vdb entry |
http://secunia.com/advisories/30426 | third party advisory vendor advisory |
https://docushare.xerox.com/doug/dsweb/View/Collection-7503 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42748 | vdb entry |
http://securityreason.com/securityalert/4638 | third party advisory |