Latest from our blog
Cross-Site Scripting (XSS) in Feng Office
|Vendor:||Secure Data SRL|
|Vulnerable Versions:||2.3.2-rc and probably prior|
|Advisory Publication:||September 18, 2013 [without technical details]|
|Vendor Notification:||September 18, 2013|
|Public Disclosure:||October 9, 2013|
|Latest Update:||October 9, 2013|
|Vulnerability Type:||Cross-Site Scripting [CWE-79]|
|CVSSv2 Base Score:||4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)|
|Solution Status:||Solution Available|
|Discovered and Provided:||High-Tech Bridge Security Research Lab|
High-Tech Bridge Security Research Lab discovered vulnerability in Feng Office, which can be exploited to perform Cross-Site Scripting (XSS) attacks against users of vulnerable application.
|Vendor did not reply to 3 notifications by email, 1 notification by twitter, 1 notification by contact form on website, 1 forum thread, 1 support ticket. Currently we are not aware of any official solution for this vulnerability.|
Unofficial patch was developed by High-Tech Bridge Security Research Lab and is available here: https://www.htbridge.com/advisory/HTB23174-patch.zip
| High-Tech Bridge Advisory HTB23174 - https://www.htbridge.com/advisory/HTB23174 - Cross-Site Scripting (XSS) in Feng Office.|
 Feng Office - http://www.fengoffice.com - Feng Office is a Web-based Software that integrates Project Management, Client Relationship Management, Billing, Financing, among other features that help you efficiently run your Professional Services Business.
 Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
 Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
 ImmuniWeb® SaaS - hybrid of manual web application penetration test and cutting-edge vulnerability scanner available online via a Software-as-a-Service (SaaS) model.
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.