ID CVE-2007-2377
Summary The Getahead Direct Web Remoting (DWR) framework 1.1.4 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
References
Vulnerable Configurations
  • cpe:2.3:a:getahead:direct_web_remoting:1.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:getahead:direct_web_remoting:1.1.4:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 20-02-2009 - 06:21)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
misc http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf
osvdb 43322
suse SUSE-SR:2009:004
Last major update 20-02-2009 - 06:21
Published 30-04-2007 - 23:19
Last modified 20-02-2009 - 06:21
Back to Top