ID

VAR-200804-0422


CVE

CVE-2008-1775


TITLE

ManageEngine Firewall Analyzer 'mindex.do' Cross-Site Scripting Vulnerability

Trust: 0.9

sources: BID: 28604 // CNNVD: CNNVD-200804-181

DESCRIPTION

Cross-site scripting (XSS) vulnerability in mindex.do in ManageEngine Firewall Analyzer 4.0.3 allows remote attackers to inject arbitrary web script or HTML via the displayName parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. ManageEngine Firewall Analyzer 4.0.3 is vulnerable; other versions may be affected as well. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Input passed to the "displayName" parameter in mindex.do is not properly sanitised before being returned to a user. Successful exploitation requires that the target user is logged in to the application. The vulnerability is reported in version 4.0.3. SOLUTION: Filter malicious characters and character sequences using a web proxy. The vendor will reportedly fix this in the next release. PROVIDED AND/OR DISCOVERED BY: Jason Rhodes ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-1775 // JVNDB: JVNDB-2008-004332 // BID: 28604 // VULHUB: VHN-31900 // PACKETSTORM: 65164

AFFECTED PRODUCTS

vendor:manageenginemodel:firewall analyzerscope:eqversion:4.0.3

Trust: 1.9

vendor:zohomodel:manageengine firewall analyzerscope:eqversion:4.0.3

Trust: 0.8

sources: BID: 28604 // JVNDB: JVNDB-2008-004332 // CNNVD: CNNVD-200804-181 // NVD: CVE-2008-1775

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1775
value: LOW

Trust: 1.0

NVD: CVE-2008-1775
value: LOW

Trust: 0.8

CNNVD: CNNVD-200804-181
value: LOW

Trust: 0.6

VULHUB: VHN-31900
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2008-1775
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-31900
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-31900 // JVNDB: JVNDB-2008-004332 // CNNVD: CNNVD-200804-181 // NVD: CVE-2008-1775

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-31900 // JVNDB: JVNDB-2008-004332 // NVD: CVE-2008-1775

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200804-181

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 65164 // CNNVD: CNNVD-200804-181

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-004332

PATCH

title:Firewall Analyzerurl:http://www.manageengine.com/products/firewall/

Trust: 0.8

sources: JVNDB: JVNDB-2008-004332

EXTERNAL IDS

db:NVDid:CVE-2008-1775

Trust: 2.8

db:BIDid:28604

Trust: 2.0

db:SECUNIAid:29632

Trust: 1.8

db:JVNDBid:JVNDB-2008-004332

Trust: 0.8

db:CNNVDid:CNNVD-200804-181

Trust: 0.7

db:XFid:41810

Trust: 0.6

db:VULHUBid:VHN-31900

Trust: 0.1

db:PACKETSTORMid:65164

Trust: 0.1

sources: VULHUB: VHN-31900 // BID: 28604 // JVNDB: JVNDB-2008-004332 // PACKETSTORM: 65164 // CNNVD: CNNVD-200804-181 // NVD: CVE-2008-1775

REFERENCES

url:http://www.securityfocus.com/bid/28604

Trust: 1.7

url:http://secunia.com/advisories/29632

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41810

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1775

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1775

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/41810

Trust: 0.6

url:http://manageengine.adventnet.com/products/firewall/index.html

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/13811/

Trust: 0.1

url:http://secunia.com/advisories/29632/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-31900 // BID: 28604 // JVNDB: JVNDB-2008-004332 // PACKETSTORM: 65164 // CNNVD: CNNVD-200804-181 // NVD: CVE-2008-1775

CREDITS

Jason Rhodes

Trust: 0.9

sources: BID: 28604 // CNNVD: CNNVD-200804-181

SOURCES

db:VULHUBid:VHN-31900
db:BIDid:28604
db:JVNDBid:JVNDB-2008-004332
db:PACKETSTORMid:65164
db:CNNVDid:CNNVD-200804-181
db:NVDid:CVE-2008-1775

LAST UPDATE DATE

2025-04-10T23:05:25.559000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-31900date:2017-08-08T00:00:00
db:BIDid:28604date:2015-05-07T17:30:00
db:JVNDBid:JVNDB-2008-004332date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200804-181date:2008-09-05T00:00:00
db:NVDid:CVE-2008-1775date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-31900date:2008-04-14T00:00:00
db:BIDid:28604date:2008-04-04T00:00:00
db:JVNDBid:JVNDB-2008-004332date:2012-09-25T00:00:00
db:PACKETSTORMid:65164date:2008-04-04T20:56:23
db:CNNVDid:CNNVD-200804-181date:2008-04-14T00:00:00
db:NVDid:CVE-2008-1775date:2008-04-14T16:05:00