Cross-site scripting in Microsoft products - CVE-2012-2520
Published: January 11, 2017 / Updated: March 13, 2017
Vulnerability identifier: #VU4236
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:A/U:Green
CVE-ID: CVE-2012-2520
CWE-ID: CWE-79
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Microsoft
Affected software:
Microsoft Communicator
Microsoft Lync
Microsoft Office InfoPath
Microsoft Office Web Apps
Microsoft Office
Microsoft SharePoint Server
Groove Server
Microsoft Windows SharePoint Services
Microsoft Communicator
Microsoft Lync
Microsoft Office InfoPath
Microsoft Office Web Apps
Microsoft Office
Microsoft SharePoint Server
Groove Server
Microsoft Windows SharePoint Services
Detailed vulnerability description
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks and gain elevated privileges.
The vulnerability exists due to insufficient sanitization of user-input within HTML Sanitization Component. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user’s browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Note: the vulnerability was being actively exploited.
The vulnerability exists due to insufficient sanitization of user-input within HTML Sanitization Component. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user’s browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Note: the vulnerability was being actively exploited.
How to mitigate CVE-2012-2520
Install update from vendor's website.