Public exploits available
On this page
A reflected XSS vulnerability exists in Remote Desktop Web Access that could allow an attacker to inject a client-side script into the user's instance of Internet Explorer.
This script could spoof content, disclose information, or take any action that the user could take on the Remote Desktop Web Access site.
Technical details (analysis)
The vulnerability is a cross-site scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the site in the context of the target user. An attacker who successfully exploited this vulnerability would need to send a specially crafted link and convince a user to click the link. In all cases, however, an attacker would have no way to force a user to visit the Web site. Instead, an attacker would have to persuade a user to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes the user to the vulnerable Web site.
Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
All applications not on the affected list.
Release Date: 2011-08-09T00:00:00
Known false positives
No known false positives at this time.
Enable Internet Explorer 8 and Internet Explorer 9 XSS filter for Intranet Zone