You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@openmeetings.apache.org by "rahul bhola (JIRA)" <ji...@apache.org> on 2013/09/16 07:11:51 UTC
[jira] [Updated] (OPENMEETINGS-793) Possibility of Code Injection
Vulnerability found.
[ https://issues.apache.org/jira/browse/OPENMEETINGS-793?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
rahul bhola updated OPENMEETINGS-793:
-------------------------------------
Attachment: 2.png
1.png
here are the exploited images. 2.png is after code injection and 1.png is after code execution by browser JS engine
> Possibility of Code Injection Vulnerability found.
> --------------------------------------------------
>
> Key: OPENMEETINGS-793
> URL: https://issues.apache.org/jira/browse/OPENMEETINGS-793
> Project: Openmeetings
> Issue Type: Bug
> Environment: flash version 11.2.202.243 , mozilla firefox, linux
> Reporter: rahul bhola
> Priority: Critical
> Attachments: 1.png, 2.png
>
>
> Code injection vulnerability. I was using flash version 11.2.202.243 and OM hosted at http://demo.dataved.ru/openmeetings/ . there is a possibility of code injection in chat room. I was able to pass javascript code to the browser engine in mozilla firefox (linux)
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira