A vulnerability has been found in Microsoft Exchange Server 2013 CU21/2016 CU10 and classified as critical. Affected by this vulnerability is an unknown function of the component Outlook Web Access. The manipulation with an unknown input leads to a cross site scripting vulnerability. The CWE definition for the vulnerability is CWE-80. As an impact it is known to affect integrity. An attacker might be able to inject arbitrary html and script code into the web site. This would alter the appearance and would make it possible to initiate further attacks against site visitors.
The weakness was published 10/09/2018 as confirmed security update guide (Website). It is possible to read the advisory at portal.msrc.microsoft.com. The public release has been coordinated with Microsoft. This vulnerability is known as CVE-2018-8448. The attack can be launched remotely. The exploitation doesn't need any form of authentication. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $5k-$25k at the moment (estimation calculated on 10/10/2018). The advisory points out:
An elevation of privilege vulnerability exists when Microsoft Exchange Outlook Web Access (OWA) fails to properly handle web requests. An attacker who successfully exploited this vulnerability could perform script/content injection attacks and attempt to trick the user into disclosing sensitive information.
Applying a patch is able to eliminate this problem. A possible mitigation has been published immediately after the disclosure of the vulnerability.
CPE
CVSSv3
VulDB Meta Base Score: 4.3
VulDB Meta Temp Score: 4.1
VulDB Base Score:
4.3VulDB Temp Score:
4.1VulDB Vector:
🔒VulDB Reliability:
🔍CVSSv2
VulDB Base Score:
🔒VulDB Temp Score:
🔒VulDB Reliability:
🔍Exploiting
Class: Cross site scripting (
CWE-80)
Local: No
Remote: Yes
Availability: No
Price Prediction:
🔍Current Price Estimation:
🔒Threat Intelligence
Threat:
🔍Adversaries:
🔍Geopolitics:
🔍Economy:
🔍Predictions:
🔍Actions:
🔍Countermeasures
Recommended: Patch
Status: Official fix
Reaction Time:
🔒0-Day Time:
🔒Exposure Time:
🔒Timeline
10/09/2018 Advisory disclosed10/09/2018 Countermeasure disclosed
10/10/2018 VulDB entry created10/10/2018 VulDB last updateSources
Advisory:
portal.msrc.microsoft.comStatus: Confirmed
Coordinated:
🔒CVE:
CVE-2018-8448 (
🔒)
Entry
Created: 10/10/2018
Complete:
🔍Lien vers l'article source