ID CVE-2007-1504
Summary Cross-site scripting (XSS) vulnerability in the Servlet Service in Fujitsu Interstage Application Server (IJServer) 8.0.2 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly involving web.xml and HTTP 404 and 500 status codes.
References
Vulnerable Configurations
  • cpe:2.3:a:fujitsu:interstage_application_server:3.0:*:*:*:enterprise:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:3.0:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:3.0:*:*:*:standard:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:3.0:*:*:*:standard:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:4.0:*:*:*:enterprise:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:4.0:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:4.0:*:*:*:standard:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:4.0:*:*:*:standard:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:4.0:*:*:*:web_j:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:4.0:*:*:*:web_j:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:*:*:enterprise:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:*:*:standard:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:*:*:standard:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:*:*:web_j:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:*:*:web_j:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:5.0.1:*:*:*:enterprise:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:5.0.1:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:6.0:*:*:*:enterprise:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:6.0:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:*:*:enterprise:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:*:*:plus:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:*:*:plus:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:*:*:standard:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:*:*:standard:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:*:*:enterprise:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:*:*:plus:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:*:*:plus:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:*:*:enterprise:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:*:*:standard_j:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:*:*:standard_j:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:8.0.2:*:*:*:enterprise:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:8.0.2:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:8.0.2:*:*:*:standard_j:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:8.0.2:*:*:*:standard_j:*:*:*
  • cpe:2.3:a:fujitsu:interstage_apworks:6.0:*:*:ja:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_apworks:6.0:*:*:ja:*:*:*:*
CVSS
Base: 4.3 (as of 21-11-2017 - 15:44)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
refmap via4
bid 23020
confirm http://www.fujitsu.com/global/support/software/security/products-f/interstage-200701e.html
jvn JVN#83832818
misc http://software.fujitsu.com/jp/security/vulnerabilities/jvn-83832818.html
osvdb 34276
secunia 24508
vupen ADV-2007-0996
xf interstage-application-servlet-xss(33099)
Last major update 21-11-2017 - 15:44
Published 19-03-2007 - 22:19
Last modified 21-11-2017 - 15:44
Back to Top