Microsoft Lync Server 2010 reachLocale Parameter XSS

Medium Nessus Plugin ID 68880


A web application on the remote host has a cross-site scripting vulnerability.


According to its self-reported version number, the version of Web Components Server (a component of Microsoft Lync 2010) has a cross-site scripting vulnerability. Input passed to the 'reachLocale' parameter of ReachJoin.aspx is not properly sanitized. An attacker could exploit this by tricking a user into requesting a specially crafted URL, resulting in arbitrary script code execution.


Install the Lync Server 2010, Web Components Server April 2011 update (KB2500441) or later.

See Also

Plugin Details

Severity: Medium

ID: 68880

File Name: microsoft_lync_server_april_2011.nasl

Version: $Revision: 1.4 $

Type: local

Agent: windows

Family: Windows

Published: 2013/07/14

Modified: 2015/07/10

Dependencies: 68879

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:lync_server:2010

Required KB Items: installed_sw/Microsft Lync

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/06/10

Vulnerability Publication Date: 2011/06/10

Reference Information

BID: 48235

OSVDB: 73380

IAVB: 2011-B-0074

CWE: 20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990