CVE-2008-5807 - Cross-Site Scripting (XSS) vulnerability in Teamst Testlink

Publication

2008-12-31

Last modification

2017-08-08

Summary

Multiple cross-site scripting (XSS) vulnerabilities in TestLink before 1.8 RC1 allow remote attackers to inject arbitrary web script or HTML via (1) Testproject Names and (2) Testplan Names in planEdit.php, and possibly (3) Testcaseprefixes in projectview.tpl.

Description

TestLink is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input. Attacker-supplied HTML and script code would execute in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.Versions prior to TestLink 1.8 RC1 are vulnerable.

Solution

These issues have been addressed in TestLink 1.8 RC1. Please see the references for more information.

Exploit

Attackers can exploit these issues using a browser.

Classification

CWE-79 - Cross-Site Scripting (XSS)

Risk level (CVSS AV:N/AC:M/Au:N/C:N/I:P/A:N)

Medium

4.3

Access Vector

  • Network
  • Adjacent Network
  • Local

Access Complexity

  • Low
  • Medium
  • High

Authentication

  • None
  • Single
  • Multiple

Confident. Impact

  • Complete
  • Partial
  • None

Integrity Impact

  • Complete
  • Partial
  • None

Affected Products

Vendor Product Versions
Teamst Testlink  1.7.4 , 1.7.3 , 1.7.1 , 1.8 , 1.7.2