NetMRI Login Application Cross-site Scripting Vulnerability

2009.02.19
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Title ----- DDIVRT-2009-20 NetMRI Login Application Cross-site Scripting Vulnerability Severity -------- Low Date Discovered --------------- January 19th 2009 Discovered By ------------- Digital Defense, Inc. Vulnerability Research Team Credit: David Marshall and r_at_b13$ Vulnerability Description ------------------------- NetMRI contains a cross-site scripting (XSS) issue whereby portions of the GET request are echoed back in an error page. This allows scripting tags to be executed by the browser to perform XSS attacks. Such an attack would require convincing a user to click on a specially crafted link. Solution Description -------------------- On February 18, 2009, Netcordia released a patch named "CrossScriptPatch.gpg" to address this vulnerability in all currently supported versions of NetMRI through v3.0.1. Customers can acquire the patch through the normal mechanisms or contact Netcordia Technical Support (support_at_netcordia.com) for assistance. Additionally, the necessary changes will be incorporated in future versions beginning with NetMRI v3.0.2. Tested Systems / Software (with versions) ------------------------------------------ Red Hat Linux, NetMRI Vendor Contact -------------- Name: Netcordia Website: http://www.netcordia.com/products/netmri-event-analysis.asp Contact Information: http://www.netcordia.com/contact/index.asp

References:

http://www.securityfocus.com/bid/33824
http://www.securityfocus.com/archive/1/archive/1/501033/100/0/threaded
http://secunia.com/advisories/33963
http://connection.netcordia.com/forums/t/731.aspx


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top