Информационная безопасность
[RU] switch to English


Дополнительная информация

  Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)

  [USN-2558-1] Mailman vulnerability

  WSO2 Identity Server multiple vulnerabilities

  Manage Engine Desktop Central 9 - CVE-2015-2560 - Unauthorised administrative password reset

  [ MDVSA-2015:087 ] egroupware

From:Securify B.V. <lists_(at)_securify.nl>
Date:12 мая 2015 г.
Subject:Reflected Cross-Site Scripting vulnerability in asdoc generated documentation


------------------------------------------------------------------------
Reflected Cross-Site Scripting vulnerability in asdoc generated
documentation
------------------------------------------------------------------------
Radjnies Bhansingh, March 2014

------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
A reflected Cross-Site scripting vulnerability was found in Apache
Flex's asdoc generated API documentation. This issue allows attackers to
perform a wide variety of actions, such as stealing victims' session
tokens or login credentials if available, performing arbitrary actions
on their behalf but also performing arbitrary redirects to potential
malicious websites.

------------------------------------------------------------------------
Affected products
------------------------------------------------------------------------
Apache Flex reports that all versions of Apache Flex before 4.14.1 are
affected by this vulnerability.

------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
The Apache Flex team fixed the issue in asdoc in Apache Flex 4.14.1.
Users can also manually apply the following patch to fix this issue
manually.
https://git-wip-us.apache.org/repos/asf/flex-sdk/repo?p=flex-sdk.
git;a=commitdiff;h=151c6fa1e46529acb74c1baf056d431da1db0422

Users should upgrade their version of Apache Flex and regenerate their
current documentation generated with asdoc. Please note that any local
modification to the asdoc index.html will need to be saved as they are
not reapplied by asdoc on the newly generated documentation.

------------------------------------------------------------------------
Details
------------------------------------------------------------------------
https://www.securify.
nl/advisory/SFY20150301/reflected_cross_site_scripting_vulnerability_in_asdoc_gen
erated_documentation.html

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород