|
Message-ID: <CAJmbs8iHGMwpVPfhindZrzn1tGjUVPtatDvB-LMx3+7rxAsgwQ@mail.gmail.com> Date: Fri, 12 Aug 2016 17:03:51 +0700 From: Maxim Solodovnik <solomax@...che.org> To: Matthew Daley <mattd@...fuzz.com>, Openmeetings user-list <user@...nmeetings.apache.org>, user-russian@...nmeetings.apache.org, dev <dev@...nmeetings.apache.org>, security@...che.org, oss-security@...ts.openwall.com, bugtraq@...urityfocus.com Subject: [CVE-2016-3089] Apache OpenMeetings XSS in SWF panel Severity: Moderate Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings 3.1.0 Description: The value of the URL's "swf" query parameter is interpolated into the JavaScript tag without being escaped, leading to the reflected XSS. All users are recommended to upgrade to Apache OpenMeetings 3.1.2 Credit: This issue was identified by Matthew Daley Apache OpenMeetings Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.