RSSOwl vulnerable to arbitrary script execution


RSSOwl is vulnerable to arbitrary script execution.

RSSOwl is an RSS/Atom feed reader. RSSOwl is vulnerable to arbitrary script execution due to the improper processing during HTML page output based on feed information.

Daiki Fukumori of Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V2 Severity:
Base Metrics 4.3 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products

  • RSSOwl versions prior to 2.1.1


An arbitrary script may be executed on the user's web browser.

[Update the software]
Update to the latest version according to the information provided by the developer.
Vendor Information

CWE (What is CWE?)

  1. Cross-site Scripting(CWE-79) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2012-1252

  1. JVN : JVN#77947437
  2. National Vulnerability Database (NVD) : CVE-2012-1252
Revision History

  • [2012/05/25]
      Web page was published