Published:2012/04/26  Last Updated:2012/04/26

OSQA vulnerable to cross-site scripting


OSQA (The Open Source Q&A system) contains a cross-site scripting vulnerability.

Products Affected

  • OSQA trunk revisions prior to 1234
  • OSQA version 0.9.0 (Fantasy Island) Beta 3 and earlier


OSQA is an open source question and answer system. OSQA contains a cross-site scripting vulnerability.


An arbitrary script may be executed on the user's web browser.


Apply a patch
Apply the patch according to the information provided the developer.

According to the developer, this issue was addressed in revision 1234.


JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2012.04.26

Measures Conditions Severity
Access Required can be attacked over the Internet using packets
  • High
Authentication anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file
  • Mid
Exploit Complexity the user must be convinced to take a difficult or suspicious action. If the honest user must have elevated privileges, they are likely to be more suspiciouse
  • High

Description of each analysis measures


Kousuke Ebihara reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Reports
CERT Advisory
CPNI Advisory
CVE CVE-2012-1245
JVN iPedia JVNDB-2012-000036