CERTA-2012-AVI-013
Vulnerability from certfr_avis

Une vulnérabilité dans Microsoft AntiXSS permet de réaliser une injection de code indirecte (XSS).

Description

Microsoft AntiXSS est une bibliothèque pouvant être utilisée sur un serveur web pour le protéger d'attaques de type XSS (injection de code indirecte). Cette bibliothèque comporte une vulnérabilité permettant à un attaquant distant d'effectuer une attaque XSS.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Microsoft AntiXSS en versions antérieures à 4.2

Impacted products
Vendor Product Description
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eMicrosoft AntiXSS en versions  ant\u00e9rieures \u00e0 4.2\u003c/p\u003e",
  "content": "## Description\n\nMicrosoft AntiXSS est une biblioth\u00e8que pouvant \u00eatre utilis\u00e9e sur un\nserveur web pour le prot\u00e9ger d\u0027attaques de type XSS (injection de code\nindirecte). Cette biblioth\u00e8que comporte une vuln\u00e9rabilit\u00e9 permettant \u00e0\nun attaquant distant d\u0027effectuer une attaque XSS.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2012-0007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0007"
    }
  ],
  "initial_release_date": "2012-01-11T00:00:00",
  "last_revision_date": "2012-01-11T00:00:00",
  "links": [],
  "reference": "CERTA-2012-AVI-013",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2012-01-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 dans Microsoft AntiXSS permet de r\u00e9aliser une\ninjection de code indirecte (XSS).\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Microsoft AntiXSS",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS12-007 du 10 janvier 2012",
      "url": "http://technet.microsoft.com/en-us/security/bulletin/MS12-007"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…