Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Title HP/Palm webOS, Execution of Arbitrary Code, Denial of Service (DoS), Unauthorized File System Write Access
Name HPSBMI02632 SSRT100379 First vendor Publication 2011-05-09
Vendor HP Last vendor Modification 2011-05-09
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Potential JavaScript and HTML injection security vulnerabilities have been identified with the Email application shipped with HP/Palm webOS. These vulnerabilities could be exploited to allow potential execution of arbitrary code or lead to a Denial of Service (DoS) condition.

Original Source

Url : http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02822174

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-264 Permissions, Privileges, and Access Controls
50 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

Os 2

Open Source Vulnerability Database (OSVDB)

Id Description
72319 HP Palm WebOS Plug-in Development Kit Unspecified Arbitrary File Overwrite

HP Palm WebOS contains a flaw related to Plug-in Development Kit applications that may allow an attacker to overwrite arbitrary files. No further details have been provided.
72318 HP Palm WebOS Email Unspecified XSS

HP Palm WebOS contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the Email application does not validate certain unspecified input before returning it to the user. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.