ID

VAR-200707-0198


CVE

CVE-2007-4023


TITLE

Aruba Mobility Controller Series cross-site scripting vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2007-000551

DESCRIPTION

Cross-site scripting (XSS) vulnerability in the login CGI program in Aruba Mobility Controller 2.5.4.18 and earlier, and 2.4.8.6-FIPS and earlier FIPS versions, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Aruba Mobility Controller series, switch products from Aruba Networks, contain a cross-site scripting vulnerability. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. This issue affects versions prior to Aruba Mobility Controller 2.5.4.18 and FIPS prior to 2.4.8.6-FIPS. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. Certain input passed to the login pages is not properly sanitised before being returned to the user. SOLUTION: Update to the latest patched firmware version. http://www.arubanetworks.com/support PROVIDED AND/OR DISCOVERED BY: The vendor credits Adair Collins and Steve Palmer of HostsPlus, and Nobuhiro Tsuji of NTT DATA SECURITY. ORIGINAL ADVISORY: http://www.arubanetworks.com/support/alerts/aid-070907b.asc ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-4023 // JVNDB: JVNDB-2007-000551 // BID: 25059 // VULHUB: VHN-27385 // PACKETSTORM: 58031

AFFECTED PRODUCTS

vendor:arubamodel:mobility controllerscope:lteversion:2.5.4.18

Trust: 1.0

vendor:arubamodel:mobility controllerscope:lteversion:2.4.8.6-fips

Trust: 1.0

vendor:arubamodel:mobility controllerscope:eqversion:earlier than 2.5.4.18

Trust: 0.8

vendor:arubamodel:mobility controllerscope:eqversion:2.4.8.6-fips

Trust: 0.6

vendor:arubamodel:mobility controllerscope:eqversion:2.5.4.18

Trust: 0.6

vendor:arubamodel:networks aruba mobility controllersscope:eqversion:2.5.4.17

Trust: 0.3

vendor:arubamodel:networks aruba mobility controllers .5-fipsscope:eqversion:2.4.8

Trust: 0.3

vendor:arubamodel:networks aruba mobility controllersscope:neversion:2.5.4.18

Trust: 0.3

vendor:arubamodel:networks aruba mobility controllers .6-fipsscope:neversion:2.4.8

Trust: 0.3

sources: BID: 25059 // JVNDB: JVNDB-2007-000551 // CNNVD: CNNVD-200707-480 // NVD: CVE-2007-4023

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4023
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2007-000551
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200707-480
value: MEDIUM

Trust: 0.6

VULHUB: VHN-27385
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-4023
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2007-000551
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-27385
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27385 // JVNDB: JVNDB-2007-000551 // CNNVD: CNNVD-200707-480 // NVD: CVE-2007-4023

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-4023

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200707-480

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 58031 // CNNVD: CNNVD-200707-480

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000551

PATCH

title:AID-070907burl:http://www.arubanetworks.com/support/alerts/aid-070907b.asc

Trust: 0.8

sources: JVNDB: JVNDB-2007-000551

EXTERNAL IDS

db:NVDid:CVE-2007-4023

Trust: 2.8

db:SECUNIAid:26192

Trust: 2.6

db:BIDid:25059

Trust: 2.0

db:VUPENid:ADV-2007-2646

Trust: 1.7

db:SECTRACKid:1018457

Trust: 1.7

db:OSVDBid:36469

Trust: 1.7

db:CERT/CCid:VU#680449

Trust: 1.1

db:JVNid:JVN25471539

Trust: 0.8

db:JVNDBid:JVNDB-2007-000551

Trust: 0.8

db:XFid:35605

Trust: 0.6

db:CNNVDid:CNNVD-200707-480

Trust: 0.6

db:VULHUBid:VHN-27385

Trust: 0.1

db:PACKETSTORMid:58031

Trust: 0.1

sources: VULHUB: VHN-27385 // BID: 25059 // JVNDB: JVNDB-2007-000551 // PACKETSTORM: 58031 // CNNVD: CNNVD-200707-480 // NVD: CVE-2007-4023

REFERENCES

url:http://secunia.com/advisories/26192

Trust: 2.5

url:http://www.arubanetworks.com/support/alerts/aid-070907b.asc

Trust: 1.8

url:http://www.securityfocus.com/bid/25059

Trust: 1.7

url:http://osvdb.org/36469

Trust: 1.7

url:http://www.securitytracker.com/id?1018457

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/680449

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/2646

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35605

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4023

Trust: 0.8

url:http://jvn.jp/en/jp/jvn25471539/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-4023

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/35605

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/2646

Trust: 0.6

url:http://www.arubanetworks.com/

Trust: 0.3

url:https://support.arubanetworks.com/

Trust: 0.3

url:http://www.arubanetworks.com/support/wsirt/alerts/aid-021307b.asc

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/13472/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/13471/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/26192/

Trust: 0.1

url:http://www.arubanetworks.com/support

Trust: 0.1

url:http://secunia.com/product/13473/

Trust: 0.1

url:http://secunia.com/product/13474/

Trust: 0.1

sources: VULHUB: VHN-27385 // BID: 25059 // JVNDB: JVNDB-2007-000551 // PACKETSTORM: 58031 // CNNVD: CNNVD-200707-480 // NVD: CVE-2007-4023

CREDITS

Vendor credits Adair Collins and Steve Palmer of HostsPlus for reporting this issue and Nobuhiro Tsuji of NTT DATA SECURITY CORPORATION for independent discovery of this issue.

Trust: 0.3

sources: BID: 25059

SOURCES

db:VULHUBid:VHN-27385
db:BIDid:25059
db:JVNDBid:JVNDB-2007-000551
db:PACKETSTORMid:58031
db:CNNVDid:CNNVD-200707-480
db:NVDid:CVE-2007-4023

LAST UPDATE DATE

2025-04-10T23:16:42.690000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-27385date:2017-07-29T00:00:00
db:BIDid:25059date:2015-05-07T17:36:00
db:JVNDBid:JVNDB-2007-000551date:2008-05-21T00:00:00
db:CNNVDid:CNNVD-200707-480date:2007-07-27T00:00:00
db:NVDid:CVE-2007-4023date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-27385date:2007-07-26T00:00:00
db:BIDid:25059date:2007-07-25T00:00:00
db:JVNDBid:JVNDB-2007-000551date:2008-05-21T00:00:00
db:PACKETSTORMid:58031date:2007-07-26T04:26:32
db:CNNVDid:CNNVD-200707-480date:2007-07-26T00:00:00
db:NVDid:CVE-2007-4023date:2007-07-26T19:30:00