{"vuid":"VU#466876","idnumber":"466876","name":"EMC Documentum Product Suite version 6.7 contains a DOM based cross-site scripting vulnerability","keywords":["EMC","Webtop","XSS","cross-site scripting","DOM","CWE-79"],"overview":"EMC Documentum Product Suite version 6.7 and possibly earlier versions contain a DOM based cross-site scripting vulnerability (CWE-79).","clean_desc":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') EMC Documentum Product Suite version 6.7 and possibly earlier versions contain a DOM based cross-site scripting vulnerability. An attacker can inject arbitrary script via the vulnerable query string parameter __dmfUrl. For example: http://www.example.com/webtop/wdk/redirect.jsp?ReLoad=1372583728974&__dmfUrl=javascript:alert('xss')//","impact":"An unauthenticated remote attacker may be able to execute arbitrary script in the context of the end-user's browser session.","resolution":"Apply an Update EMC has released a security bulletin concerning this issue. Users are advised to visit the EMC support page to download patches to address this vulnerability.","workarounds":"","sysaffected":"","thanks":"Thanks to Tudor Enache of Help AG Middle East for reporting this vulnerability.","author":"This document was written by Adam Rauf.","public":["http://cwe.mitre.org/data/definitions/79.html","http://www.emc.com/enterprise-content-management/documentum-webtop.htm","http://www.securityfocus.com/archive/1/529620/30/0/threaded"],"cveids":["CVE-2013-3281"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-08-13T12:17:45Z","publicdate":"2013-11-05T00:00:00Z","datefirstpublished":"2013-11-14T14:55:29Z","dateupdated":"2013-11-14T14:55:29Z","revision":25,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"5.8","cvss_basevector":"AV:N/AC:M/Au:N/C:P/I:P/A:N","cvss_temporalscore":"4.5","cvss_environmentalscore":"3.4","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}