CERTA-2008-AVI-217
Vulnerability from certfr_avis
BusinessObjects XI est un gestionnaire de contenu en ligne (CMS) vulnérable à une attaque de type XSS.
Description
Les valeurs passées lors de l'identification ne sont pas correctement validées. Une personne malveillante peut, à l'aide de paramètres spécialement écrits, exécuter indirectement du code dans le navigateur de l'utilisateur avec le niveau de confiance associé au site utilisant BusinessObjects XI.
Solution
Se référer au bulletin de sécurité de BusinessObjects XI d'avril pour l'obtention des correctifs (cf. section Documentation).
BusinessObjects XI SP3 FP3.4 et antérieures
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eBusinessObjects XI SP3 FP3.4 et ant\u00e9rieures\u003c/P\u003e",
"content": "## Description\n\nLes valeurs pass\u00e9es lors de l\u0027identification ne sont pas correctement\nvalid\u00e9es. Une personne malveillante peut, \u00e0 l\u0027aide de param\u00e8tres\nsp\u00e9cialement \u00e9crits, ex\u00e9cuter indirectement du code dans le navigateur\nde l\u0027utilisateur avec le niveau de confiance associ\u00e9 au site utilisant\nBusinessObjects XI.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de BusinessObjects XI d\u0027avril pour\nl\u0027obtention des correctifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2008-04-18T00:00:00",
"last_revision_date": "2008-04-18T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de BusinessObjects XI d\u0027avril :",
"url": "http://www.france.businessobjects.com/products/businessobjectsxi/default.asp"
}
],
"reference": "CERTA-2008-AVI-217",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-04-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "BusinessObjects XI est un gestionnaire de contenu en ligne (\u003cspan\nclass=\"textit\"\u003eCMS\u003c/span\u003e) vuln\u00e9rable \u00e0 une attaque de type \u003cspan\nclass=\"textit\"\u003eXSS\u003c/span\u003e.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans BusinessObjects XI",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 de BusinessObjects XI d\u0027avril 2008",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…