Forum Thread: In reference to the report published by Vulnerability lab on June...

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Open Discussions

This thread has been marked as locked.
M.Hansen In reference to the report published by Vulnerability lab on June 18 (VL-ID 1272):
Secunia Official 18th Jun, 2014 21:48
Ranking: 188
Posts: 414
User Since: 26th Jan, 2009
System Score: N/A
Location: Copenhagen, DK
Last edited on 18th Jun, 2014 21:50

In reference to the report published by Vulnerability lab on June 18 (VL-ID 1272):

To clarify, as the report switches from implying that the CSI / VIM products are affected, to the claim the “CSI & VIM - Web Application & Online Service 2014 Q2” is affected: This is definitely not an issue in the CSI nor in the VIM product. The issue is located on the secunia.com website.

The issue described makes it possible for a person with malicious intent to inject potentially malicious content in the firstname and lastname fields, and that content will be used in an email that is sent out to the email entered in the email field, at a later stage.

JavaScript content within emails may of course always execute, if an email client is used without restricting JavaScript, which in general would be considered neglectful behavior. Furthermore, the step to send JavaScript via email can actually be performed by e.g. using various web services more efficiently and directly.

With all that in mind, as an enhancement we have of course taken steps to ensure the the firstname and lastname fields are sanitized for potentially malicious content in the future.

--
Kind regards,

Kasper Lindgaard
Director, Research & Security

No one has replied to this thread yet - be the first
This thread has been marked as locked.