Executive Summary
Summary | |
---|---|
Title | Imperva SecureSphere management GUI contains an XSS vulnerability |
Informations | |||
---|---|---|---|
Name | VU#567774 | First vendor Publication | 2011-05-31 |
Vendor | VU-CERT | Last vendor Modification | 2011-05-31 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#567774Imperva SecureSphere management GUI contains an XSS vulnerabilityOverviewAn XSS vulnerability exists in the Imperva SecureSphere management GUI.I. DescriptionDell SecureWorks'SWRX-2011-001 advisory states:"A vulnerability exists in Imperva SecureSphere due to improper validation of user-controlled input. User-controllable input is not properly sanitized for illegal or malicious content prior to being stored and later returned to an administrator in dynamically generated web content. Remote attackers could leverage this issue to conduct persistent cross-site scripting attacks. When the malicious content is viewed, arbitrary script or HTML code injected into the affected database field will be executed in the SecureSphere administrative user’s browser session in the security context of the SecureSphere administrative GUI. Successful exploitation may aid an attacker in retrieving session cookies, stealing recently submitted data, or launching further attacks." The following patches should be applied to the relevant SecureSphere version: These patches can be downloaded from Imperva's FTP site. Imperva credentials are required to access the FTP site. Vendor Information
Referenceshttp://www.secureworks.com/research/advisories/SWRX-2011-001/ Thanks to Sean Talbot of Dell SecureWorks for reporting this vulnerability. This document was written by Jared Allar.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/567774 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
72583 | SecureSphere New Alerts Page toolbarTitle XSS A persistent cross-site scripting vulnerability is present in the Imperva SecureSphere GUI. Usercontrollable input supplied to the Imperva event database via traffic destined for protected servers is not properly sanitized for illegal or malicious content prior to being stored and later returned to the user in dynamically generated web content. Remote attackers could leverage this issue to conduct persistent cross-site scripting attacks. When the malicious content is viewed in the administrative GUI, arbitrary script or HTML code injected into the affected field will be executed in an administrator's browser session in the security context of a vulnerable SecureSphere GUI session. |