Published:2007/03/13  Last Updated:2008/05/21

JVN#91706484
Trac cross-site scripting vulnerability

Overview

Trac is a project management tool from Edgewall Software. InterAct Corp. provides a localized version of Trac in Japan. Trac wiki engine contains a cross-site scripting vulnerability which affects Microsoft Internet Explorer.

Products Affected

  • trac 0.10.3 and earlier versions
  • trac-0.10.3-ja-1 and earlier versions

Description

Impact

A remote attacker could possibly execute an arbitrary script on the user's IE where the user views a Trac wiki content.

Solution

Vendor Status

Vendor Status Last Update Vendor Notes
InterAct Co., Ltd. Vulnerable 2007/03/13
Vendor Link
Edgewall Software Release Notes for Trac 0.10.3.1

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2007.03.13

Measures Conditions Severity
Access Required Routed - can be attacked over the Internet using packets
  • High
Authentication None - anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file
  • Medium
Exploit Complexity Low - little to no expertise and/or luck required to exploit (cross-site scripting)
  • High

Description of each analysis measures

Credit

Yoshinori Ohta of Business Architects Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE
JVN iPedia JVNDB-2007-000200

Update History