what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

OpenText Document Sciences xPression 4.5SP1 Patch 13 Cross Site Scripting

OpenText Document Sciences xPression 4.5SP1 Patch 13 Cross Site Scripting
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a cross site scripting vulnerability in the Deployment functionality.

tags | exploit, xss
advisories | CVE-2017-14756
SHA-256 | 73990b4f2d4900515078c4e3e54e6c2a672d4e451a27fcc91b4b3b158d608144

OpenText Document Sciences xPression 4.5SP1 Patch 13 Cross Site Scripting

Change Mirror Download
Title: OpenText Document Sciences xPression (formerly EMC Document
Sciences xPression) - Cross-Site Scripting
Author: Marcin Woloszyn
Date: 27. September 2017
CVE: CVE-2017-14756

Affected Software:
==================
OpenText Document Sciences xPression (formerly EMC Document Sciences xPression)

Exploit was tested on:
======================
v4.5SP1 Patch 13 (older versions might be affected as well)

Cross-Site Scripting (User Interaction):
========================================

It is possible to inject Javascript into the application which will be
reflected to unaware application users upon certain interaction with
the application.
This might allow an attacker to perform actions on behalf of unaware
application users.
In order to remediate the issue, proper input validation, sanitizing
and output encoding should be conducted on server side.

No CSRF token is necessary for exploitation.

Vector :
--------

1) visit https://[...]/xAdmin/html/Deployment?show=true&cat_id=501egdkn'%2balert(1)//&show=true

2) click on "xPresso Documents" - XSS is triggered.

Fix:
====
https://knowledge.opentext.com/knowledge/llisapi.dll/Open/68982774

Contact:
========
mw[at]nme[dot]pl


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close