CERTA-2004-AVI-068

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité de type « cross site scripting » a été découverte sur l'interface d'administration des produits VPN NetScreen-SA séries 5000.

Description

Une vulnérabilité de type « cross site scripting » sur le script CGI delhomepage.cgi de l'interface d'administration des produits VPN NetScreen-SA séries 5000 permet à un utilisateur mal intentionné d'exécuter un script sur le poste client d'un utilisateur authentifié sur ce produit.

Solution

Un correctif est disponible sur le site de support de NetScreen (cf. section documentation) pour les sections suivantes :

  • 3.2.1 Patch 1-S2
  • 3.3-S1
  • 3.3 Patch 1-S1
  • 3.3.1-S1

NetScreen-SA IVE de la version 3.0 à la version 3.3.1 présent sur les produits VPN NetScreen 5000.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eNetScreen-SA IVE de la version 3.0 \u00e0 la  version 3.3.1 pr\u00e9sent sur les produits VPN NetScreen 5000.\u003c/p\u003e",
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 de type \u00ab cross site scripting \u00bb sur le script CGI\ndelhomepage.cgi de l\u0027interface d\u0027administration des produits VPN\nNetScreen-SA s\u00e9ries 5000 permet \u00e0 un utilisateur mal intentionn\u00e9\nd\u0027ex\u00e9cuter un script sur le poste client d\u0027un utilisateur authentifi\u00e9\nsur ce produit.\n\n## Solution\n\nUn correctif est disponible sur le site de support de NetScreen (cf.\nsection documentation) pour les sections suivantes :\n\n-   3.2.1 Patch 1-S2\n-   3.3-S1\n-   3.3 Patch 1-S1\n-   3.3.1-S1\n",
  "cves": [],
  "links": [
    {
      "title": "Correctifs de NetScreen :",
      "url": "https://support.neoteris.com"
    },
    {
      "title": "Note d\u0027information sur les vuln\u00e9rabilit\u00e9s de type Cross    Site Scripting (CERTA-2002-INF-001) :",
      "url": "http://www.certa.ssi.gouv.fr/site/CERTA-2002-INF-001/index.html"
    },
    {
      "title": "Avis de s\u00e9curit\u00e9 de NetScreen :",
      "url": "http://www.netscreen.com/services/security/alerts/ive_xss.txt"
    }
  ],
  "reference": "CERTA-2004-AVI-068",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-03-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 de type \u00ab cross site scripting \u00bb a \u00e9t\u00e9 d\u00e9couverte sur\nl\u0027interface d\u0027administration des produits VPN NetScreen-SA s\u00e9ries 5000.\n",
  "title": "Vuln\u00e9rabilit\u00e9 sur les produits VPN NetScreen 5000",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Avis de s\u00e9curit\u00e9 de NetScreen 58412",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…