var-201809-0656
Vulnerability from variot

Dell EMC Unity and UnityVSA contains reflected cross-site scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to supply malicious HTML or Java Script code to Unisphere, which is then reflected back to the victim and executed by the web browser. An authorization-bypass vulnerability 2. A cross-site scripting vulnerability 3. The following products are vulnerable: Versions prior to EMC Unity Operating Environment (OE) 4.3.1.1525703027 Versions prior to EMC UnityVSA Operating Environment (OE) versions prior to 4.3.1.1525703027. UnityVSA is another version of it. A remote authenticated user could potentially exploit this vulnerability to read files in NAS server by directly interacting with certain APIs of Unity OE, bypassing Role-Based Authorization control implemented only in Unisphere GUI. Attacker could potentially phish information, including Unisphere users' credentials, from the victim once they are redirected. Customers can refer to Dell EMC target code information at: https://support.emc.com/docu39695_Target_Revisions_and_Adoption_Rates.pdf?language=en_US&language=en_US. https://support.emc.com/downloads/39949_Dell-EMC-Unity-Family

Severity Rating

For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.

Legal Information

Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.

Dell Product Security Incident Response Team

secure@dell.com -----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEP5nobPoCj3pTvhAZgSlofD2Yi6cFAlug9xcACgkQgSlofD2Y i6eFlg/9Gbfu4dYSTr8/33bFt7zXktPR49cGBV6Y0TVFTKfvfu8aAPjd6rVzRn4C rmEviuxPvgGaa2P2d43DZulhlsfanNk4TNuIX1h8aoRZyj+9V6akDjVGAiojKlbG iAvnZYn5FEv///UlRTM+Ysn1LESFCcShKs1mg3XO5wkbwYfAGuD4qubrauHCkhlx Tbv6k73/qyyNXRrSb54xpJkZC9yuswvg+ledJ39r5YH4+JEZrnqAxUxos+emBO7y KHKkZdcf+oZqbBtONefmDG/84KxgT2+X/msfT0d4mSIDmnRwQl3gVAZW093ZpRM+ E2rS18RH75G4UzXmY+m2+I5lF6t+L8TvcxMgRP2/mkkC552FSujBhJNKUyfP7ral AP2DLMMXMrib8ddtVu9lk9HcBgATye2ibeu/Q2PUD7ld6gqGnFd7gJrexiT5Razq WCPEMjgIBXWZZ4qgp3aMq8lLXZ//Zyub1awql4JYZIr8oUjxmV8Lnp/0V6hTWAfX atznclE2+UGENlWqU4vOdhI+ZOeyn7bjrdUrktsAsvSg8LUECTtvjji5QsjLP+ui 57VcVKmX2j7+61mYslIs5HScgrEfubh73HL/Cm1JZ7aqsD1TUaGzlgqS/D2SMvL4 EgyXPpE3u9gBf0oNaNkbDNXyetLHIdmblJ8bz0zm00DoTMEaHZk= =LLPx -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201809-0656",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "emc unityvsa operating environment",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dell",
        "version": "4.3.1.1525703027"
      },
      {
        "model": "emc unity operating environment",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dell",
        "version": "4.3.1.1525703027"
      },
      {
        "model": "emc unity operating environment",
        "scope": null,
        "trust": 0.8,
        "vendor": "dell",
        "version": null
      },
      {
        "model": "emc unityvsa operating environment",
        "scope": null,
        "trust": 0.8,
        "vendor": "dell",
        "version": null
      },
      {
        "model": "emc unity operating environment",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "dell",
        "version": "4.0.0.7329527"
      },
      {
        "model": "emc unity operating environment",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "dell",
        "version": "4.0.2.8627717"
      },
      {
        "model": "emc unity operating environment",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "dell",
        "version": "4.1.0.9058043"
      },
      {
        "model": "emc unity operating environment",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "dell",
        "version": "4.0.1.8404134"
      },
      {
        "model": "emc unity operating environment",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "dell",
        "version": "4.0.1.8320161"
      },
      {
        "model": "emc unity operating environment",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "dell",
        "version": "4.1.0.8940590"
      },
      {
        "model": "emc unity operating environment",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "dell",
        "version": "4.0.1.8194551"
      },
      {
        "model": "emc unity operating environment",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "dell",
        "version": "4.1.0.8959731"
      },
      {
        "model": "emc unity operating environment",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "dell",
        "version": "4.1.1.9138882"
      },
      {
        "model": "emc unity operating environment",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "dell",
        "version": "4.1.2.9257522"
      },
      {
        "model": "unityvsa operating environment",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "emc",
        "version": "4.3.1"
      },
      {
        "model": "unityvsa operating environment",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "emc",
        "version": "4.3.0.1522077968"
      },
      {
        "model": "unity operating environment",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "emc",
        "version": "4.3.1"
      },
      {
        "model": "unity operating environment",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "emc",
        "version": "4.3.0.1522077968"
      },
      {
        "model": "emc unityvsa operating environment",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "dell",
        "version": "4.3.1.1525703027"
      },
      {
        "model": "emc unity operating environment",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "dell",
        "version": "4.3.1.1525703027"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "107304"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011139"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1287"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-1246"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:dell:emc_unity_operating_environment",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:dell:emc_unityvsa_operating_environment",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011139"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "107304"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2018-1246",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-1246",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-122421",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.8,
            "id": "CVE-2018-1246",
            "impactScore": 2.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.8,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "security_alert@emc.com",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.8,
            "id": "CVE-2018-1246",
            "impactScore": 1.4,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-1246",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "security_alert@emc.com",
            "id": "CVE-2018-1246",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-1246",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201809-1287",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-122421",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-122421"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011139"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1287"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-1246"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-1246"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Dell EMC Unity and UnityVSA contains reflected cross-site scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to supply malicious HTML or Java Script code to Unisphere, which is then reflected back to the victim and executed by the web browser. An authorization-bypass vulnerability\n2. A cross-site scripting vulnerability\n3. \nThe following products are vulnerable:\nVersions prior to EMC Unity Operating Environment (OE) 4.3.1.1525703027\nVersions prior to EMC UnityVSA Operating Environment (OE) versions prior to 4.3.1.1525703027. UnityVSA is another version of it. A remote authenticated user could potentially exploit this vulnerability to read files in NAS server by directly interacting with certain APIs of Unity OE, bypassing Role-Based Authorization control implemented only in Unisphere GUI. Attacker could potentially phish information, including Unisphere users\u0027 credentials, from the victim once they are redirected. \nCustomers can refer to Dell EMC target code information at: https://support.emc.com/docu39695_Target_Revisions_and_Adoption_Rates.pdf?language=en_US\u0026language=en_US. \nhttps://support.emc.com/downloads/39949_Dell-EMC-Unity-Family \n\n\nSeverity Rating\n\nFor an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. \n\nLegal Information\n\nRead and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise \nfrom the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical \nSupport (https://support.emc.com/servicecenter/contactEMC/). Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided \"as is\" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. \n\nDell Product Security Incident Response Team\n\nsecure@dell.com\n-----BEGIN PGP SIGNATURE-----\n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\nEgyXPpE3u9gBf0oNaNkbDNXyetLHIdmblJ8bz0zm00DoTMEaHZk=\n=LLPx\n-----END PGP SIGNATURE-----\n\n\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-1246"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011139"
      },
      {
        "db": "BID",
        "id": "107304"
      },
      {
        "db": "VULHUB",
        "id": "VHN-122421"
      },
      {
        "db": "PACKETSTORM",
        "id": "149428"
      }
    ],
    "trust": 2.07
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-122421",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-122421"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-1246",
        "trust": 2.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011139",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1287",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "107304",
        "trust": 0.3
      },
      {
        "db": "PACKETSTORM",
        "id": "149428",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-122421",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-122421"
      },
      {
        "db": "BID",
        "id": "107304"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011139"
      },
      {
        "db": "PACKETSTORM",
        "id": "149428"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1287"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-1246"
      }
    ]
  },
  "id": "VAR-201809-0656",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-122421"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T21:38:18.424000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "An Introduction to Unity Software | Dell EMC US",
        "trust": 0.8,
        "url": "https://www.dellemc.com/en-us/documentation/unity-family/unity-p-software-upgrades/01-unity-upg-br-introduction.htm"
      },
      {
        "title": "Dell EMC UnityVSA",
        "trust": 0.8,
        "url": "https://www.dellemc.com/en-us/products-solutions/trial-software-download/unity-vsa.htm"
      },
      {
        "title": "Dell EMC Unity Operating Environment Fixes for cross-site scripting vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85293"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011139"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1287"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-122421"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011139"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-1246"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "https://seclists.org/fulldisclosure/2018/sep/30"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1246"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-1246"
      },
      {
        "trust": 0.3,
        "url": "http://www.emc.com/"
      },
      {
        "trust": 0.1,
        "url": "https://support.emc.com/servicecenter/contactemc/)."
      },
      {
        "trust": 0.1,
        "url": "https://support.emc.com/downloads/39949_dell-emc-unity-family"
      },
      {
        "trust": 0.1,
        "url": "https://support.emc.com/docu39695_target_revisions_and_adoption_rates.pdf?language=en_us\u0026language=en_us."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1250"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1251"
      },
      {
        "trust": 0.1,
        "url": "https://support.emc.com/kb/468307)."
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-122421"
      },
      {
        "db": "BID",
        "id": "107304"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011139"
      },
      {
        "db": "PACKETSTORM",
        "id": "149428"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1287"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-1246"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-122421"
      },
      {
        "db": "BID",
        "id": "107304"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011139"
      },
      {
        "db": "PACKETSTORM",
        "id": "149428"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1287"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-1246"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-09-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-122421"
      },
      {
        "date": "2018-09-18T00:00:00",
        "db": "BID",
        "id": "107304"
      },
      {
        "date": "2019-01-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-011139"
      },
      {
        "date": "2018-09-19T01:45:51",
        "db": "PACKETSTORM",
        "id": "149428"
      },
      {
        "date": "2018-09-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201809-1287"
      },
      {
        "date": "2018-09-28T18:29:00.863000",
        "db": "NVD",
        "id": "CVE-2018-1246"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-122421"
      },
      {
        "date": "2018-09-18T00:00:00",
        "db": "BID",
        "id": "107304"
      },
      {
        "date": "2019-01-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-011139"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201809-1287"
      },
      {
        "date": "2024-11-21T03:59:27.490000",
        "db": "NVD",
        "id": "CVE-2018-1246"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1287"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Dell EMC Unity and  UnityVSA Vulnerable to cross-site scripting",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011139"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "xss",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "149428"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1287"
      }
    ],
    "trust": 0.7
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…