ID

VAR-200710-0051


CVE

CVE-2007-5472


TITLE

CA HIPS of Server Component cross-site scripting vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2007-002787

DESCRIPTION

Cross-site scripting (XSS) vulnerability in the Server component in CA Host-Based Intrusion Prevention System (HIPS) before 8.0.0.93 allows remote attackers to inject arbitrary web script or HTML via requests that are written to logs for later display in the log viewer. Attacker-supplied HTML and script code would execute in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible. This issue affects versions of CA HIPS prior to 8.0.0.93. CA-based host intrusion detection system (HIPS) combines independent firewall, intrusion detection and defense capabilities to provide active centralized threat defense. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Input passed in certain requests to the server is not properly sanitised before being logged. The vulnerability is reported in versions prior to 8.0.0.93. SOLUTION: Apply patches. http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO91494 PROVIDED AND/OR DISCOVERED BY: The vendor credits David Maciejak. ORIGINAL ADVISORY: http://supportconnectw.ca.com/public/cahips/infodocs/cahips-secnotice.asp ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Title: [CAID 35754]: CA Host-Based Intrusion Prevention System (CA HIPS) Server Vulnerability CA Vuln ID (CAID): 35754 CA Advisory Date: 2007-10-18 Reported By: David Maciejak Impact: A remote attacker can take unauthorized administrative action. The vulnerability, CVE-2007-5472, occurs due to raw request data being displayed in the log when viewed by a browser. Note: The client installation is not vulnerable. Mitigating Factors: The client installation is not vulnerable. Severity: CA has given these vulnerabilities a maximum risk rating of Medium. Affected Products: CA Host-Based Intrusion Prevention System (CA HIPS) r8 Affected Platforms: Windows Status and Recommendation: CA has issued the following patch to address the vulnerabilities. CA Host-Based Intrusion Prevention System (CA HIPS) r8: QO91494 How to determine if you are affected: 1. Log in to the HIPS Administration Console. 2. Scroll down to the end of the Main page. 3. Press the "About" link on the right bottom side of the page. 4. Check the version. If the version is less than 8.0.0.93, the installation is vulnerable. Workaround: None References (URLs may wrap): CA SupportConnect: http://supportconnect.ca.com/ Security Notice for CA Host-Based Intrusion Prevention System (CA HIPS) Server http://supportconnectw.ca.com/public/cahips/infodocs/cahips-secnotice.asp Solution Document Reference APARs: QO91494 CA Security Advisor posting: CA Host-Based Intrusion Prevention System (CA HIPS) Server Vulnerability http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=158327 CA Vuln ID (CAID): 35754 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35754 Reported By: David Maciejak CVE References: CVE-2007-5472 - log content injection http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5472 OSVDB References: Pending http://osvdb.org/ Changelog for this advisory: v1.0 - Initial Release Customers who require additional information should contact CA Technical Support at http://supportconnect.ca.com. For technical questions or comments related to this advisory, please send email to vuln AT ca DOT com. If you discover a vulnerability in CA products, please report your findings to vuln AT ca DOT com, or utilize our "Submit a Vulnerability" form. URL: http://www.ca.com/us/securityadvisor/vulninfo/submit.aspx Regards, Ken Williams ; 0xE2941985 Director, CA Vulnerability Research CA, 1 CA Plaza, Islandia, NY 11749 Contact http://www.ca.com/us/contact/ Legal Notice http://www.ca.com/us/legal/ Privacy Policy http://www.ca.com/us/privacy/ Copyright (c) 2007 CA. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.5.3 (Build 5003) wj8DBQFHGLWAeSWR3+KUGYURAlHTAJ9Wee7boFMoFj8p/dsrJl7YbkWmvQCbBeJ0 YlGWH5DdYWfAT3nGzaxImnk= =bkku -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2007-5472 // JVNDB: JVNDB-2007-002787 // BID: 26134 // VULHUB: VHN-28834 // PACKETSTORM: 60238 // PACKETSTORM: 60283

AFFECTED PRODUCTS

vendor:broadcommodel:host-based intrusion prevention systemscope:lteversion:8

Trust: 1.0

vendor:camodel:host-based intrusion prevention systemscope:ltversion:8.0.0.93

Trust: 0.8

vendor:camodel:host-based intrusion prevention systemscope:eqversion:8

Trust: 0.6

vendor:computermodel:associates host-based intrusion prevention systemscope:eqversion:8.093

Trust: 0.3

sources: BID: 26134 // JVNDB: JVNDB-2007-002787 // CNNVD: CNNVD-200710-426 // NVD: CVE-2007-5472

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-5472
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-5472
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200710-426
value: MEDIUM

Trust: 0.6

VULHUB: VHN-28834
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-5472
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-28834
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-28834 // JVNDB: JVNDB-2007-002787 // CNNVD: CNNVD-200710-426 // NVD: CVE-2007-5472

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-28834 // JVNDB: JVNDB-2007-002787 // NVD: CVE-2007-5472

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 60283 // CNNVD: CNNVD-200710-426

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-200710-426

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-002787

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-28834

PATCH

title:Security Notice for CA Host-Based Intrusion Prevention System (CA HIPS) Serverurl:http://supportconnectw.ca.com/public/cahips/infodocs/cahips-secnotice.asp

Trust: 0.8

title:CA Host-based intrusion detection system server HTML Fixes for code injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=147099

Trust: 0.6

sources: JVNDB: JVNDB-2007-002787 // CNNVD: CNNVD-200710-426

EXTERNAL IDS

db:NVDid:CVE-2007-5472

Trust: 2.9

db:BIDid:26134

Trust: 2.0

db:SECUNIAid:27301

Trust: 1.8

db:VUPENid:ADV-2007-3547

Trust: 1.7

db:SECTRACKid:1018839

Trust: 1.7

db:OSVDBid:37998

Trust: 1.7

db:JVNDBid:JVNDB-2007-002787

Trust: 0.8

db:CNNVDid:CNNVD-200710-426

Trust: 0.6

db:PACKETSTORMid:60283

Trust: 0.2

db:VULHUBid:VHN-28834

Trust: 0.1

db:PACKETSTORMid:60238

Trust: 0.1

sources: VULHUB: VHN-28834 // BID: 26134 // JVNDB: JVNDB-2007-002787 // PACKETSTORM: 60238 // PACKETSTORM: 60283 // CNNVD: CNNVD-200710-426 // NVD: CVE-2007-5472

REFERENCES

url:http://supportconnectw.ca.com/public/cahips/infodocs/cahips-secnotice.asp

Trust: 2.2

url:http://www.securityfocus.com/bid/26134

Trust: 1.7

url:http://www.securityfocus.com/archive/1/482536/100/0/threaded

Trust: 1.7

url:http://osvdb.org/37998

Trust: 1.7

url:http://securitytracker.com/id?1018839

Trust: 1.7

url:http://secunia.com/advisories/27301

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/3547

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/37285

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5472

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-5472

Trust: 0.8

url:http://www.ca.com

Trust: 0.3

url:/archive/1/482536

Trust: 0.3

url:http://secunia.com/advisories/27301/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/16198/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo91494

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.ca.com/us/privacy/

Trust: 0.1

url:http://www.ca.com/us/securityadvisor/vulninfo/submit.aspx

Trust: 0.1

url:http://supportconnect.ca.com.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5472

Trust: 0.1

url:http://osvdb.org/

Trust: 0.1

url:http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35754

Trust: 0.1

url:http://supportconnect.ca.com/

Trust: 0.1

url:http://www.ca.com/us/contact/

Trust: 0.1

url:http://www.ca.com/us/legal/

Trust: 0.1

url:http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=158327

Trust: 0.1

sources: VULHUB: VHN-28834 // BID: 26134 // JVNDB: JVNDB-2007-002787 // PACKETSTORM: 60238 // PACKETSTORM: 60283 // CNNVD: CNNVD-200710-426 // NVD: CVE-2007-5472

CREDITS

David Maciejak※ david.maciejak@kyxar.fr

Trust: 0.6

sources: CNNVD: CNNVD-200710-426

SOURCES

db:VULHUBid:VHN-28834
db:BIDid:26134
db:JVNDBid:JVNDB-2007-002787
db:PACKETSTORMid:60238
db:PACKETSTORMid:60283
db:CNNVDid:CNNVD-200710-426
db:NVDid:CVE-2007-5472

LAST UPDATE DATE

2025-04-10T23:24:22.859000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-28834date:2018-10-15T00:00:00
db:BIDid:26134date:2007-10-19T19:47:00
db:JVNDBid:JVNDB-2007-002787date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200710-426date:2021-04-12T00:00:00
db:NVDid:CVE-2007-5472date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-28834date:2007-10-22T00:00:00
db:BIDid:26134date:2007-10-18T00:00:00
db:JVNDBid:JVNDB-2007-002787date:2012-06-26T00:00:00
db:PACKETSTORMid:60238date:2007-10-22T18:39:08
db:PACKETSTORMid:60283date:2007-10-22T22:50:26
db:CNNVDid:CNNVD-200710-426date:2007-10-22T00:00:00
db:NVDid:CVE-2007-5472date:2007-10-22T19:46:00