Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:XSS:SHAREPOINT-USER

Severity

High

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

Microsoft Sharepoint User XSS

Release Date

2012/07/09

Update Number

2159

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Microsoft Sharepoint User XSS


This signature detects attempts to exploit a known cross site scripting vulnerability in Microsoft Sharepoint. A remote attacker can exploit this by enticing a target user to open a Sharepoint site. In a successful code injection attack, the behavior of the target host is entirely dependent on the intended function of the injected code and executes within the security context of the currently logged in user. If the attack is unsuccessful, the vulnerable application can terminate abnormally.

Extended Description

Microsoft SharePoint is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input. Attacker-supplied HTML and script code would run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

Affected Products

  • Microsoft InfoPath 2007 SP3
  • Microsoft InfoPath 2010 SP1 (32-bit editions)
  • Microsoft InfoPath 2010 SP1 (64-bit editions)
  • Microsoft InfoPath 2007 SP2
  • Microsoft InfoPath 2010
  • Microsoft SharePoint Foundation 2010 SP1
  • Microsoft SharePoint Foundation 2010
  • Microsoft SharePoint Server 2010 SP1
  • Microsoft SharePoint Server 2010 Standard Edition

References

  • BugTraq: 49620
  • BugTraq: 54313
  • CVE: CVE-2012-1861

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out