[Japanese]

JVNDB-2012-000048

RSSOwl vulnerable to arbitrary script execution

Overview

RSSOwl is vulnerable to arbitrary script execution.

RSSOwl is an RSS/Atom feed reader. RSSOwl is vulnerable to arbitrary script execution due to the improper processing during HTML page output based on feed information.

Daiki Fukumori of Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V2 Severity:
Base Metrics 4.3 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products


RSSOwl
  • RSSOwl versions prior to 2.1.1

Impact

An arbitrary script may be executed on the user's web browser.
Solution

[Update the software]
Update to the latest version according to the information provided by the developer.
Vendor Information

RSSOwl
CWE (What is CWE?)

  1. Cross-site Scripting(CWE-79) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2012-1252
References

  1. JVN : JVN#77947437
  2. National Vulnerability Database (NVD) : CVE-2012-1252
Revision History

  • [2012/05/25]
      Web page was published