Short Name |
HTTP:STC:INTERWOVEN-WORKDOC-XSS |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
InterWoven WorkDocs XSS Vulnerability |
Release Date |
2015/06/14 |
Update Number |
2506 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known cross-site scripting vulnerability against Interwoven WorkDocs, a document management tool for the enterprise. It is possible for a malicious attacker to inject script code into malformed URL which may eventually lead to many different attack scenarios including the gathering of credentials for use within WorkDocs. Depending on the script executed, the victim's browser will behave according to the functionality of the injected script. For example, if the attacker injects the following scripting code, "<script>location.reload()</script>", the client's browser will keep reloading the present URL infinitely, forcing the visitor to close the current Browser window. If the script was "<script>alert(document.cookie)</script>', the browser will popup an alert dialog displaying the current cookie. Therefore, depending on the goal of the attacker, the behaviour of the attack target will change.