OSVDB ID: 86750

Title: Layton HelpBox writesolutionuser.asp Multiple Parameter XSS

Info

Disclosure

Oct 26, 2012

Discovery

Unknown

Dates

Exploit

Oct 26, 2012

Solution

Unknown

Description

Layton HelpBox contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the 'sys_solution_id', 'sys_requesttype_id', 'sys_problem_desc', 'sys_solution_desc', 'sys_problemsummary', 'usr_Action_testing', 'usr_Escalation', and 'usr_Additional_Resources' parameters upon submission to the writesolutionuser.asp script. This may allow a user to create a specially crafted request that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.

Classification

Location: Remote / Network Access
Attack Type: Input Manipulation
Impact: Loss of Integrity
Solution: Discontinued Product
Exploit: Exploit Public
Disclosure: Vendor Verified, Coordinated Disclosure
OSVDB: Web Related

Solution

The vendor has discontinued this product in favor of ServiceDesk, which it recommends users migrate to, and therefore has no patch or upgrade that mitigates this problem. It is possible that users with an existing support contract may be able to contact the vendor for a fix for HelpBox, but this has not been confirmed.

Products

Layton Technology, Inc.

Layton HelpBox

4.4.0

References

Credit

Unknown or Incomplete



Direct URL: http://osvdb.org/86750