Atlassian Confluence Server 5.1.x < 5.1.1 XSS

low Nessus Network Monitor Plugin ID 9637

Synopsis

The remote Confluence server is affected by a cross-site scripting (XSS) vulnerability.

Description

Versions of Confluence 5.1.x prior to 5.1.1 contain a flaw that allows a reflected XSS attack. This flaw exists because the 'managereferrers.vm' script does not validate input to the 'justAdded' parameter before returning it to users. This may allow a context-dependent attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.

Solution

Upgrade to Confluence 5.1.x version 5.1.1 or later.

See Also

https://jira.atlassian.com/browse/CONF-27396

https://jira.atlassian.com/projects/CONF/versions/32106

Plugin Details

Severity: Low

ID: 9637

Family: CGI

Published: 10/14/2016

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:atlassian:confluence

Patch Publication Date: 4/11/2013

Vulnerability Publication Date: 4/29/2013