PT-2012-26: Remote JS Code Execution in qutIM

Vulnerable software

qutIM
Version: 0.3 and earlier

Link:
http://qutim.org/

Severity level

Severity level: Medium
Impact: JS Code Execution
Access Vector: Remote

CVSS v2:
Base Score: 5.4
Vector: (AV:A/AC:M/Au:N/C:P/I:P/A:P)

CVE: not assigned

Software description

qutIM is a free open source multiprotocol (ICQ, Jabber, Mail.Ru, IRC, VKontakte) IM client for Windows, Linux, MacOS X, OS/2, Symbian, Maemo/MeeGo, Solaris and *BSD.

Vulnerability description

The specialists of the Positive Research center have detected "Unauthorized Remote JS Code Execution" vulnerability in qutIM.

The vulnerability allows an attacker to send a specially crafted massage with JS code, and will potentially be executed on the recipient’s side.
Example:

How to fix

Update your software up to the latest version

Advisory status

14.08.2012 - Vendor is notified
14.08.2012 - Vendor gets vulnerability details
23.09.2013 - Vendor releases fixed version and details 
08.10.2013 - Public disclosure

Credits

The vulnerability was detected by Mikhail Firstov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2012-26

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

Threatscape
Visionary WAF – Constant innovation