Summary
This web application is running with the Vaadin Framework which is prone to multiple cross-site scripting issues because the application fails to properly sanitize user-supplied input.
Impact
This could potentially, in certain situations, allow a malicious user to inject content, such as javascript, in order to perform a cross-site scripting (XSS) attack.
Solution
Upgrade to Vaadin Framework version 7.1.11 or later For updates refer to http://www.vaadin.com/releases
Insight
Multiple flaws exists due to,
- Proper escaping of the src-attribute on the client side was not ensured when using icons for OptionGroup items.
- The client side Util.getAbsoluteUrl() did not ensure proper escaping of the given URL.
Affected
Vaadin Framework versions from 7.0.0 up to 7.1.10
Detection
Check the version.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Apache Tomcat 'sendfile' Request Attributes Information Disclosure Vulnerability
- Aker Secure Mail Gateway Cross-Site Scripting Vulnerability
- Ampache Reflected Cross Site Scripting Vulnerability
- Apache mod_proxy_ajp Information Disclosure Vulnerability
- Apache mod_proxy_ftp Wildcard Characters XSS Vulnerability