4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.005 Low
EPSS
Percentile
75.6%
Pluck SiteLife software contains multiple XSS vulnerabilities.
According to DemandMedia’s website Pluck SiteLife software is an integrated community platform architected for brands. Pluck SiteLife software contains multiple cross site scripting (XSS) vulnerabilities.
CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
[http://sitelife.example.host/ver1.0/Direct/Process?referrerURL=x&jsonRequest=](<http://sitelife.example.host/ver1.0/Direct/Process?referrerURL=x&jsonRequest=>)``<body%20onload=alert(1)//> ``<http://sitelife.example.host/ver1.0/Direct/jsonp.htm?r=>``<img%20src=x%20onerror=alert(2)//>&cb=<body%20onload=alert(1)//> ``<http://sitelife.example.host/ver1.0/sys/jsonp.app/.htm?cb=>``<img%20src=x%20onerror=alert(1)>&widget_path=pluck%2fuser%2fpersona%wffirstperson%2fprofile.app
It has also has been reported that the cv
, jsonRequest
, r
and ctk
parameter could be vulnerable in some instances.
An attacker with access to the Pluck SiteLife software can conduct a cross site scripting attack, which could be used to result in information leakage, privilege escalation, and/or denial of service.
Apply an Update
Pluck has stated that all affected customers have already been notified via email in regards to the new release and changelog documentation is available for customers who login to the Pluck Connect portal. Users are advised to upgrade to release 5.0.13 or later.
Restrict access
As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS or CSRF attacks since the attack comes as an HTTP request from a legitimate user’s host. Restricting access would prevent an attacker from accessing a Pluck SiteLife software using stolen credentials from a blocked network location.
400619
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: January 03, 2012 Updated: April 03, 2012
Affected
DemandMedia has stated that all affected customers have already been notified via email in regards to the new release and changelog documentation is available for customers who login to the Pluck Connect portal.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | 6 | AV:N/AC:M/Au:S/C:P/I:P/A:P |
Temporal | 5 | E:F/RL:OF/RC:C |
Environmental | 3.8 | CDP:N/TD:M/CR:ND/IR:ND/AR:ND |
Thanks to Phil Purviance for reporting this vulnerability.
This document was written by Michael Orlando.
CVE IDs: | CVE-2012-0253 |
---|---|
Date Public: | 2012-04-10 Date First Published: |