Multiple vulnerabilities have been reported in Tine 2.0, which can be exploited by malicious people to conduct cross-site scripting attacks.
1) Certain input passed via the "file" parameter to the phpexcel and idnaconvert libraries is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
2) Input passed via the "lang" parameter to library/idnaconvert/example.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
3) Input appended to the URL after library/PHPExcel/PHPExcel/Shared/JAMA/docs/download.php and library/idnaconvert/example.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Vulnerable Products
Vulnerable Software: Tine 2.0
Solution
Update to version Maisha released on October 4th, 2011.