First published: Thu Dec 13 2018(Updated: )
Pixar's Tractor software, versions 2.2 and earlier, contain a stored cross-site scripting vulnerability in the field that allows a user to add a note to an existing node. The stored information is displayed when a user requests information about the node. An attacker could insert Javascript into this note field that is then saved and displayed to the end user. An attacker might include Javascript that could execute on an authenticated user's system that could lead to website redirects, session cookie hijacking, social engineering, etc. As this is stored with the information about the node, all other authenticated users with access to this data are also vulnerable.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pixar Tractor | <=2.2 |
Pixar has released an updated version of this software that mitigates this vulnerability, Tractor version 2.3 (build 1923604). Affected users should update to this version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security issue is CVE-2018-5411.
The severity rating of CVE-2018-5411 is 5.4 (Medium).
The affected software in this vulnerability is Pixar Tractor versions 2.2 and earlier.
The CWE ID associated with CVE-2018-5411 is CWE-79.
To fix the cross-site scripting vulnerability in Pixar Tractor, it is recommended to upgrade to version 2.3 or higher.