search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Pixar Tractor contains a stored cross-site scripting vulnerability

Vulnerability Note VU#756913

Original Release Date: 2018-12-13 | Last Revised: 2019-01-28

Overview

Pixar's Tractor network rendering software is vulnerable to stored cross-site scripting which may allow an attacker to execute arbitrary JavaScript.

Description

Pixar's Tractor software, versions 2.2 and earlier, contain a stored cross-site scripting vulnerability (CWE-79) in the field that allows a user to add a note to an existing node. The stored information is displayed when a user requests information about the node. An attacker could insert JavaScript into this note field that is then saved and displayed to the end user.

Impact

An authenticated attacker might include JavaScript that could execute on an authenticated user's system, which could lead to website redirects, session cookie hijacking, social engineering, and other impacts. Since the attacker's script is stored with the information about the node, all other users with access to this data are also vulnerable.

Solution

Apply an update

Pixar has released an updated version of this software that addresses this vulnerability, Tractor version 2.3 (build 1923604). Affected users should update to this version.

Vendor Information

756913
 
Affected   Unknown   Unaffected

Pixar Animation Studios

Notified:  December 05, 2018 Updated:  December 13, 2018

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base 3.2 AV:L/AC:L/Au:S/C:N/I:P/A:P
Temporal 2.5 E:POC/RL:OF/RC:C
Environmental 0.8 CDP:L/TD:L/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to the reporter who wishes to remain anonymous.

This document was written by Madison Oliver.

Other Information

CVE IDs: CVE-2018-5411
Date Public: 2018-12-12
Date First Published: 2018-12-13
Date Last Updated: 2019-01-28 17:04 UTC
Document Revision: 54

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.