Skip to main content

CVE-1999-1167: Cross-site scripting vulnerability in Third Voice Web annotation utility allows remote users to read

Medium
VulnerabilityCVE-1999-1167cve-1999-1167cross-site scripting
Published: Fri Dec 31 1999 (12/31/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: third_voice
Product: third_voice_web

Description

Cross-site scripting vulnerability in Third Voice Web annotation utility allows remote users to read sensitive data and generate fake web pages for other Third Voice users by injecting malicious Javascript into an annotation.

AI-Powered Analysis

AILast updated: 07/01/2025, 11:42:39 UTC

Technical Analysis

CVE-1999-1167 describes a cross-site scripting (XSS) vulnerability in the Third Voice Web annotation utility. This utility allowed users to add annotations to web pages, which were then visible to other users of the Third Voice service. The vulnerability arises because the application failed to properly sanitize user-supplied input in annotations, enabling remote attackers to inject malicious JavaScript code. When other users viewed the annotated pages, the injected script would execute in their browsers under the context of the affected site. This could lead to unauthorized reading of sensitive data accessible to the user, such as cookies or session tokens, and the generation of fake web pages or content that could mislead or manipulate users. The vulnerability does not require authentication and can be exploited remotely over the network. The CVSS score of 6.4 (medium severity) reflects the fact that the attack vector is network-based, requires no authentication, and impacts confidentiality and integrity but not availability. No patches or fixes are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 1999) and the obsolescence of the Third Voice product, active exploitation today is unlikely, but the vulnerability remains a historical example of the risks posed by insufficient input validation in web applications.

Potential Impact

For European organizations, the impact of this vulnerability would primarily be the potential compromise of user data confidentiality and integrity if the Third Voice Web annotation utility were still in use. Attackers could steal session cookies or other sensitive information, leading to unauthorized access or impersonation. Additionally, the ability to generate fake web pages could facilitate phishing or social engineering attacks targeting employees or customers. However, given the age of the vulnerability and the fact that Third Voice is no longer a widely used or supported product, the direct impact on modern European organizations is minimal. Nonetheless, the vulnerability highlights the importance of securing web annotation or collaboration tools that may still be in use, as similar XSS flaws could be exploited in contemporary software. Organizations relying on legacy web annotation utilities should be aware of such risks and consider migrating to supported, secure alternatives.

Mitigation Recommendations

Since no patches are available for this specific vulnerability, European organizations should consider the following practical mitigation steps: 1) Disable or remove the Third Voice Web annotation utility from all web environments to eliminate the attack surface. 2) If removal is not immediately possible, implement web application firewalls (WAFs) with rules designed to detect and block malicious JavaScript injection attempts targeting annotation inputs. 3) Conduct thorough input validation and output encoding on any web annotation or user-generated content features in current applications to prevent similar XSS vulnerabilities. 4) Educate users about the risks of interacting with untrusted annotations or web content and encourage cautious behavior. 5) Regularly audit legacy web applications and plugins for known vulnerabilities and plan for their replacement or upgrade. 6) Monitor network traffic and logs for unusual activity that could indicate exploitation attempts. These measures will help mitigate risks not only from this specific vulnerability but also from similar XSS threats in modern environments.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df5f3

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 11:42:39 AM

Last updated: 7/25/2025, 10:25:26 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats