You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@openmeetings.apache.org by "rahul bhola (JIRA)" <ji...@apache.org> on 2013/09/16 07:11:51 UTC

[jira] [Updated] (OPENMEETINGS-793) Possibility of Code Injection Vulnerability found.

     [ https://issues.apache.org/jira/browse/OPENMEETINGS-793?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

rahul bhola updated OPENMEETINGS-793:
-------------------------------------

    Attachment: 2.png
                1.png

here are the exploited images. 2.png is after code injection and 1.png is after code execution by browser JS engine
                
> Possibility of Code Injection Vulnerability found.
> --------------------------------------------------
>
>                 Key: OPENMEETINGS-793
>                 URL: https://issues.apache.org/jira/browse/OPENMEETINGS-793
>             Project: Openmeetings
>          Issue Type: Bug
>         Environment: flash version 11.2.202.243 , mozilla firefox, linux
>            Reporter: rahul bhola
>            Priority: Critical
>         Attachments: 1.png, 2.png
>
>
> Code injection vulnerability. I was using flash version 11.2.202.243 and OM hosted at http://demo.dataved.ru/openmeetings/ . there is a possibility of code injection in chat room. I was able to pass javascript code to the browser engine in mozilla firefox (linux)

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira