Multiple cross-site scripting (XSS) vulnerabilities in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance allow remote attackers to inject arbitrary web script or HTML via crafted input to ASP pages, as demonstrated using the backurl parameter to sdccommon/verify/asp/n6plugindestructor.asp.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.kb.cert.org/vuls/id/602801 | us government resource third party advisory patch |
http://wintercore.com/en/component/content/article/7-media/18-wintercore-releases-an-advisory-for-consona-products.html | |
http://www.wintercore.com/downloads/rootedcon_0day.pdf | exploit |
http://www.securityfocus.com/archive/1/511176/100/0/threaded | mailing list |
http://secunia.com/advisories/39740 | third party advisory vendor advisory |
http://www.consona.com/Content/CRM/Support/SecurityBulletin_April2010.pdf | patch vendor advisory |
http://www.securityfocus.com/bid/39999 | vdb entry exploit |