qutimdevelop team mailing list archive
-
qutimdevelop team
-
Mailing list archive
-
Message #01178
[Bug 1036545] Re: Unauthorized Remote JS Code Execution
** Changed in: qutim
Status: New => Fix Released
--
You received this bug notification because you are a member of QutIM
Developers, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1036545
Title:
Unauthorized Remote JS Code Execution
Status in Multiplatform instant messenger:
Fix Released
Bug description:
QutIM
Version 0.3 and, possibly, earlier
Impact
Sverity: Medium
Impact type: Unauthorized Remote JS Code Execution
Access Vector: Remote
CVSS v2:
Base Score: 5.4
Vector: (AV:A/AC:M/Au:N/C:P/I:P/A:P)
CVE: Not assigned
Vulnerability Description
The specialists of Positive Research, the Positive Technologies
company, detected Unauthorized Remote JS Code Execution in the QutIM
application.
The vulnerability allows an attacker to send a specially crafted massage with JS code, and will potentially be executed on the recipient’s side.
Example:
<svg onload=”alert(1)”>
The vulnerability was detected by Mikhail Firstov, Positive Research
Center (Positive Technologies Company)
To manage notifications about this bug go to:
https://bugs.launchpad.net/qutim/+bug/1036545/+subscriptions
References