CERTA-2004-AVI-068
Vulnerability from certfr_avis

Une vulnérabilité de type « cross site scripting » a été découverte sur l'interface d'administration des produits VPN NetScreen-SA séries 5000.

Description

Une vulnérabilité de type « cross site scripting » sur le script CGI delhomepage.cgi de l'interface d'administration des produits VPN NetScreen-SA séries 5000 permet à un utilisateur mal intentionné d'exécuter un script sur le poste client d'un utilisateur authentifié sur ce produit.

Solution

Un correctif est disponible sur le site de support de NetScreen (cf. section documentation) pour les sections suivantes :

  • 3.2.1 Patch 1-S2
  • 3.3-S1
  • 3.3 Patch 1-S1
  • 3.3.1-S1

NetScreen-SA IVE de la version 3.0 à la version 3.3.1 présent sur les produits VPN NetScreen 5000.

Impacted products
Vendor Product Description

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eNetScreen-SA IVE de la version 3.0 \u00e0 la  version 3.3.1 pr\u00e9sent sur les produits VPN NetScreen 5000.\u003c/p\u003e",
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 de type \u00ab cross site scripting \u00bb sur le script CGI\ndelhomepage.cgi de l\u0027interface d\u0027administration des produits VPN\nNetScreen-SA s\u00e9ries 5000 permet \u00e0 un utilisateur mal intentionn\u00e9\nd\u0027ex\u00e9cuter un script sur le poste client d\u0027un utilisateur authentifi\u00e9\nsur ce produit.\n\n## Solution\n\nUn correctif est disponible sur le site de support de NetScreen (cf.\nsection documentation) pour les sections suivantes :\n\n-   3.2.1 Patch 1-S2\n-   3.3-S1\n-   3.3 Patch 1-S1\n-   3.3.1-S1\n",
  "cves": [],
  "initial_release_date": "2004-03-05T00:00:00",
  "last_revision_date": "2004-03-05T00:00:00",
  "links": [
    {
      "title": "Correctifs de NetScreen :",
      "url": "https://support.neoteris.com"
    },
    {
      "title": "Note d\u0027information sur les vuln\u00e9rabilit\u00e9s de type Cross    Site Scripting (CERTA-2002-INF-001) :",
      "url": "http://www.certa.ssi.gouv.fr/site/CERTA-2002-INF-001/index.html"
    },
    {
      "title": "Avis de s\u00e9curit\u00e9 de NetScreen :",
      "url": "http://www.netscreen.com/services/security/alerts/ive_xss.txt"
    }
  ],
  "reference": "CERTA-2004-AVI-068",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-03-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 de type \u00ab cross site scripting \u00bb a \u00e9t\u00e9 d\u00e9couverte sur\nl\u0027interface d\u0027administration des produits VPN NetScreen-SA s\u00e9ries 5000.\n",
  "title": "Vuln\u00e9rabilit\u00e9 sur les produits VPN NetScreen 5000",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Avis de s\u00e9curit\u00e9 de NetScreen 58412",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…