Vulnerability CVE-2007-2377


Published: 2007-04-30   Modified: 2012-02-12

Description:
The Getahead Direct Web Remoting (DWR) framework 1.1.4 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Getahead -> Direct web remoting 

 References:
http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf
http://osvdb.org/43322
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html

Copyright 2024, cxsecurity.com

 

Back to Top