Title: Cezanne SW Cross-Site Scripting ID: S21SEC-041-en Severity: Medium History: 02.Jan.2008 Vulnerability discovered Authors: Juan de la Fuente Costa (email@example.com) Fco Javier Puerta Rubio (firstname.lastname@example.org) URL: http://www.s21sec.com/avisos/s21sec-41-en.txt
[ SUMMARY ]
Cezanne develops Human Capital Management Software.
This Software provides leading-edge Human Capital Management solutions that help companies better develop, manage, reward and retain their most important asset - their people.
Cezanne include applications for employee performance management, career & succession planning, training & development, people management, recruitment, salary analysis & compensation planning, pay review, employee survey and organization charting.
[ AFFECTED VERSIONS ]
This vulnerability has been tested in Cezanne 6.5.1, and Cezanne 7.
[ DESCRIPTION ]
The identified parameter is: "SleUserName"
URL: https://www.somesite.es/cezanneweb/CFLogon/CFLogon.asp (Use a Proprietary Account)
HTTP METHOD:POST STRING:')"><script>alert("S21sec")</script>
[ WORKAROUND ]
Contact with Cezanne Software at: http://www.cezannesw.com/
[ ACKNOWLEDGMENTS ]
This vulnerability has been discovered and researched by: - Juan de la Fuente Costa S21Sec - Fco Javier Puerta Rubio S21Sec
You can find the last version of this warning in: