First published: Tue Jul 10 2012(Updated: )
Cross-site scripting (XSS) vulnerability in Microsoft Office SharePoint Server 2007 SP2 and SP3 Windows SharePoint Services 3.0 SP2, and SharePoint Foundation 2010 Gold and SP1 allows remote attackers to inject arbitrary web script or HTML via crafted JavaScript elements in a URL, aka "SharePoint Reflected List Parameter Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SharePoint Portal Server | =2007-sp2 | |
Microsoft SharePoint Portal Server | =2007-sp2 | |
Microsoft SharePoint Portal Server | =2007-sp3 | |
Microsoft SharePoint Portal Server | =2007-sp3 | |
Microsoft SharePoint Foundation 2013 | =2010 | |
Microsoft SharePoint Foundation 2013 | =2010-sp1 | |
Microsoft SharePoint Server 2010 | =2007-sp2 | |
Microsoft SharePoint Server 2010 | =2007-sp3 | |
Microsoft SharePoint Services | =3.0-sp2 | |
Microsoft SharePoint Services | =3.0-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1863 is classified as a medium severity vulnerability due to its potential for cross-site scripting attacks.
To mitigate CVE-2012-1863, ensure that you apply the latest security updates from Microsoft for affected SharePoint versions.
CVE-2012-1863 affects Microsoft Office SharePoint Server 2007 SP2/SP3, Windows SharePoint Services 3.0 SP2, and SharePoint Foundation 2010.
Yes, CVE-2012-1863 can lead to data disclosure as attackers may inject malicious scripts that capture user data.
A viable workaround for CVE-2012-1863 is to restrict input validation and escape any untrusted data before rendering it.