Microsoft Lync Server 2010 reachLocale Parameter XSS

This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.


Synopsis :

A web application on the remote host has a cross-site scripting
vulnerability.

Description :

According to its self-reported version number, the version of Web
Components Server (a component of Microsoft Lync 2010) has a cross-site
scripting vulnerability. Input passed to the 'reachLocale' parameter of
ReachJoin.aspx is not properly sanitized. An attacker could exploit
this by tricking a user into requesting a specially crafted URL,
resulting in arbitrary script code execution.

See also :

http://www.foofus.net/?p=363
http://www.foofus.net/?page_id=372
http://support.microsoft.com/kb/2500441

Solution :

Install the Lync Server 2010, Web Components Server April 2011 update
(KB2500441) or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 68880 ()

Bugtraq ID: 48235

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now