Aris AGX agXchange ESM Cross Site Scripting Vulnerability

看板Bugtraq作者時間16年前 (2010/04/06 10:23), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
========================================= Yaniv Miron aka "Lament" Advisory March 12, 2010 Aris AGX agXchange ESM Cross Site Scripting Vulnerability ========================================= ===================== I. BACKGROUND ===================== E2B safety submissions module. When it comes to the electronic submission of safety data using the E2B format, meeting the often complicated and complex requirements from different regulatory agencies⑤MEA, MHLW, FDA and other NCAs铳an be a challenge that consumes vast amounts of time, effort and resources. http://www.arisglobal.com/products/agxchange_esm.php ===================== II. DESCRIPTION ===================== A malicious attacker may inject scripts into the agXchange ESM module in the Aris AGX application. ===================== III. ANALYSIS ===================== Exploitation of this vulnerability results in the execution of arbitrary code using a malicious link. ===================== IV. EXPLOIT ===================== http://www.example.com/[agx_application]/pages/ucquerydetails.jsp?QueryID=>%22%27><img%20src%3d%22javascript:alert(31337)%22> ===================== V. DISCLOSURE TIMELINE ===================== Jan 2009 Vulnerability found Jan 2009 Vendor Notification March 2010 Public Disclosure ===================== VI. CREDIT ===================== Yaniv Miron aka "Lament". lament@ilhack.org
文章代碼(AID): #1BkfinLr (Bugtraq)