An issue was discovered in Collabtive 3.0 and later. managefile.php is vulnerable to XSS: when the action parameter is set to movefile and the id parameter corresponds to a project the current user has access to, the file and target parameters are reflected.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.collabtive.o-dyn.de/blog/ | release notes vendor advisory |
https://sisl.lab.uic.edu/projects/chess/cross-site-scripting-in-collabtive/ | third party advisory exploit |