SDL TMS 11.3.1 | CRQ-4775 | Cross-site scripting security vulnerability

Symptoms:
Pages in SDL TMS that use the returnUrl parameter were vulnerable to cross-site scripting attacks.

Explanation:
The return URL was not being validated which allowed for injection of JavaScript code into the application resulting in a vulnerability.

Resolution:
The issue was fixed by validating the returnURL parameter to ensure that JavaScript code is not injected into the application.

SDL-hosted customers should contact SDL Support to arrange for this hotfix to be deployed.

Customers who host SDL TMS themselves should download the installer for SDLTMS11.3.1 Hotfix for CRQ-4775.exe from the following FTP site: ftp://sdlpatches:5dlpatch35@ftp-emea.sdlproducts.com/SDL TMS/11.3/CU1/Hotfix/