{"vuid":"VU#521348","idnumber":"521348","name":"KnowledgeView Editorial and Management application cross-site scripting vulnerability","keywords":["KnowledgeView","XSS","CWE-79","CVE-2013-3616"],"overview":"KnowledgeView Editorial and Management application contains a reflected cross-site scripting (XSS) vulnerability (CWE-79).","clean_desc":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') KnowledgeView Editorial and Management application contains a reflected cross-site scripting vulnerability that can allow an attacker to inject arbitrary HTML content (including script) via the vulnerable query string parameter username.","impact":"A remote unauthenticated attacker can conduct a cross-site scripting attack, which may be used to result in information leakage, privilege escalation, and/or denial of service.","resolution":"We are currently unaware of a practical solution to this problem. Please consider the following workaround.","workarounds":"Restrict access As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the web interface using stolen credentials from a blocked network location.","sysaffected":"","thanks":"Thanks to Ali Hussein of Help AG Middle East for reporting this vulnerability.","author":"This document was written by Adam Rauf.","public":["http://cwe.mitre.org/data/definitions/79.html","http://www.knowledgeview.co.uk/index.php"],"cveids":["CVE-2013-3616"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-08-07T17:16:54Z","publicdate":"2013-09-23T00:00:00Z","datefirstpublished":"2013-09-23T15:32:35Z","dateupdated":"2013-09-23T15:32:36Z","revision":11,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"UC","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"5","cvss_basevector":"AV:N/AC:L/Au:N/C:N/I:P/A:N","cvss_temporalscore":"4","cvss_environmentalscore":"3","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}