var-200712-0411
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in the login page in Cisco CiscoWorks Server (CS), possibly 2.6 and earlier, when using CiscoWorks Common Services 3.0.x and 3.1, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. CiscoWorks is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. CiscoWorks 2.6 is vulnerable; other versions may also be affected.
2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively.
Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv
TITLE: CiscoWorks Common Services Cross-Site Scripting Vulnerability
SECUNIA ADVISORY ID: SA27902
VERIFY ADVISORY: http://secunia.com/advisories/27902/
CRITICAL: Less critical
IMPACT: Cross Site Scripting
WHERE:
From remote
SOFTWARE: CiscoWorks Common Services Software 3.x http://secunia.com/product/6330/
DESCRIPTION: Dave Lewis has reported a vulnerability in CiscoWorks Common Services, which can be exploited by malicious people to conduct cross-site scripting attacks.
Unspecified input passed to the CiscoWorks Server login page is not properly sanitised before being returned to the user.
The vulnerability is reported in CiscoWorks Common Services 3.0.x and 3.1 for both Solaris and Windows systems.
SOLUTION: Apply vendor patch (registered customers). http://www.cisco.com/pcgi-bin/tablebuild.pl/cw2000-cd-one
PROVIDED AND/OR DISCOVERED BY: Dave Lewis
ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sr-20071205-cw.shtml
Liquidmatrix: http://www.liquidmatrix.org/blog/2007/12/05/advisory-cross-site-scripting-in-ciscoworks/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200712-0411", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ciscoworks server", "scope": "lte", "trust": 1.8, "vendor": "cisco", "version": "2.6" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "ciscoworks", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6" } ], "sources": [ { "db": "BID", "id": "26708" }, { "db": "JVNDB", "id": "JVNDB-2007-002809" }, { "db": "NVD", "id": "CVE-2007-5582" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cisco:ciscoworks_server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-002809" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dave Lewis is credited with the discovery of this vulnerability.", "sources": [ { "db": "BID", "id": "26708" } ], "trust": 0.3 }, "cve": "CVE-2007-5582", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2007-5582", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-28944", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-5582", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2007-5582", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200712-411", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-28944", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-28944" }, { "db": "JVNDB", "id": "JVNDB-2007-002809" }, { "db": "CNNVD", "id": "CNNVD-200712-411" }, { "db": "NVD", "id": "CVE-2007-5582" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in the login page in Cisco CiscoWorks Server (CS), possibly 2.6 and earlier, when using CiscoWorks Common Services 3.0.x and 3.1, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. CiscoWorks is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. \nCiscoWorks 2.6 is vulnerable; other versions may also be affected. \n\n----------------------------------------------------------------------\n\n2003: 2,700 advisories published\n2004: 3,100 advisories published\n2005: 4,600 advisories published\n2006: 5,300 advisories published\n\nHow do you know which Secunia advisories are important to you?\n\nThe Secunia Vulnerability Intelligence Solutions allows you to filter\nand structure all the information you need, so you can address issues\neffectively. \n\nGet a free trial of the Secunia Vulnerability Intelligence Solutions:\nhttp://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv\n\n----------------------------------------------------------------------\n\nTITLE:\nCiscoWorks Common Services Cross-Site Scripting Vulnerability\n\nSECUNIA ADVISORY ID:\nSA27902\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/27902/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nCross Site Scripting\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nCiscoWorks Common Services Software 3.x\nhttp://secunia.com/product/6330/\n\nDESCRIPTION:\nDave Lewis has reported a vulnerability in CiscoWorks Common\nServices, which can be exploited by malicious people to conduct\ncross-site scripting attacks. \n\nUnspecified input passed to the CiscoWorks Server login page is not\nproperly sanitised before being returned to the user. \n\nThe vulnerability is reported in CiscoWorks Common Services 3.0.x and\n3.1 for both Solaris and Windows systems. \n\nSOLUTION:\nApply vendor patch (registered customers). \nhttp://www.cisco.com/pcgi-bin/tablebuild.pl/cw2000-cd-one\n\nPROVIDED AND/OR DISCOVERED BY:\nDave Lewis\n\nORIGINAL ADVISORY:\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sr-20071205-cw.shtml\n\nLiquidmatrix:\nhttp://www.liquidmatrix.org/blog/2007/12/05/advisory-cross-site-scripting-in-ciscoworks/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-5582" }, { "db": "JVNDB", "id": "JVNDB-2007-002809" }, { "db": "BID", "id": "26708" }, { "db": "VULHUB", "id": "VHN-28944" }, { "db": "PACKETSTORM", "id": "61551" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-5582", "trust": 2.8 }, { "db": "BID", "id": "26708", "trust": 2.0 }, { "db": "SECUNIA", "id": "27902", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2007-4102", "trust": 1.7 }, { "db": "SECTRACK", "id": "1019043", "trust": 1.7 }, { "db": "SREASON", "id": "3449", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2007-002809", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20071205 ADVISORY: CROSS SITE SCRIPTING IN CISCOWORKS", "trust": 0.6 }, { "db": "XF", "id": "38862", "trust": 0.6 }, { "db": "CISCO", "id": "20071205 CISCOWORKS SERVER XSS VULNERABILITY", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200712-411", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-28944", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "61551", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-28944" }, { "db": "BID", "id": "26708" }, { "db": "JVNDB", "id": "JVNDB-2007-002809" }, { "db": "PACKETSTORM", "id": "61551" }, { "db": "CNNVD", "id": "CNNVD-200712-411" }, { "db": "NVD", "id": "CVE-2007-5582" } ] }, "id": "VAR-200712-0411", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-28944" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:28:11.116000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Document ID: 605", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20071205-cw" }, { "title": "Cisco CiscoWorks Server Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=175103" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-002809" }, { "db": "CNNVD", "id": "CNNVD-200712-411" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-28944" }, { "db": "JVNDB", "id": "JVNDB-2007-002809" }, { "db": "NVD", "id": "CVE-2007-5582" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20071205-cw.shtml" }, { "trust": 1.8, "url": "http://www.liquidmatrix.org/blog/2007/12/05/advisory-cross-site-scripting-in-ciscoworks/" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/26708" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1019043" }, { "trust": 1.7, "url": "http://secunia.com/advisories/27902" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/3449" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2007/4102" }, { "trust": 1.6, "url": "http://tools.cisco.com/support/bugtoolkit/search/getbugdetails.do?method=fetchbugdetails\u0026bugid=cscsk69289" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/484609/100/0/threaded" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38862" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5582" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-5582" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/484609/100/0/threaded" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/38862" }, { "trust": 0.3, "url": "http://www.cisco.com" }, { "trust": 0.3, "url": "/archive/1/484609" }, { "trust": 0.1, "url": "http://tools.cisco.com/support/bugtoolkit/search/getbugdetails.do?method=fetchbugdetails\u0026amp;bugid=cscsk69289" }, { "trust": 0.1, "url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/cw2000-cd-one" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/6330/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/27902/" }, { "trust": 0.1, "url": "http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-28944" }, { "db": "BID", "id": "26708" }, { "db": "JVNDB", "id": "JVNDB-2007-002809" }, { "db": "PACKETSTORM", "id": "61551" }, { "db": "CNNVD", "id": "CNNVD-200712-411" }, { "db": "NVD", "id": "CVE-2007-5582" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-28944" }, { "db": "BID", "id": "26708" }, { "db": "JVNDB", "id": "JVNDB-2007-002809" }, { "db": "PACKETSTORM", "id": "61551" }, { "db": "CNNVD", "id": "CNNVD-200712-411" }, { "db": "NVD", "id": "CVE-2007-5582" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-12-15T00:00:00", "db": "VULHUB", "id": "VHN-28944" }, { "date": "2007-12-05T00:00:00", "db": "BID", "id": "26708" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-002809" }, { "date": "2007-12-07T16:22:07", "db": "PACKETSTORM", "id": "61551" }, { "date": "2007-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200712-411" }, { "date": "2007-12-15T01:46:00", "db": "NVD", "id": "CVE-2007-5582" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-15T00:00:00", "db": "VULHUB", "id": "VHN-28944" }, { "date": "2007-12-06T00:22:00", "db": "BID", "id": "26708" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-002809" }, { "date": "2021-12-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200712-411" }, { "date": "2024-11-21T00:38:14.973000", "db": "NVD", "id": "CVE-2007-5582" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200712-411" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco CiscoWorks Server (CS) Login page cross-site scripting vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-002809" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xss", "sources": [ { "db": "PACKETSTORM", "id": "61551" }, { "db": "CNNVD", "id": "CNNVD-200712-411" } ], "trust": 0.7 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.