ID

VAR-201106-0090


CVE

CVE-2011-0767


TITLE

Imperva SecureSphere management GUI contains an XSS vulnerability

Trust: 0.8

sources: CERT/CC: VU#567774

DESCRIPTION

Cross-site scripting (XSS) vulnerability in the management GUI in the MX Management Server in Imperva SecureSphere Web Application Firewall 6.2, 7.x, and 8.x allows remote attackers to inject arbitrary web script or HTML via an HTTP request to a firewalled server, aka Bug ID 31759. An XSS vulnerability exists in the Imperva SecureSphere management GUI. Imperva Made SecureSphere Contains a cross-site scripting vulnerability. Imperva Provided by the company SecureSphere Contains a cross-site scripting vulnerability that results from the process of validating input on the management screen. For details, check the information provided by the developer.An arbitrary script may be executed on the user's web browser. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials, control how the site is rendered to the user, or launch other attacks. ---------------------------------------------------------------------- Alerts when vulnerabilities pose a threat to your infrastructure The enhanced reporting module of the Secunia Vulnerability Intelligence Manager (VIM) enables you to combine advisory and ticket information, and generate policy compliance statistics. Using your asset list preferences, customised notifications are issued as soon as a new vulnerability is discovered - a valuable tool for documenting mitigation strategies. Watch our quick solution overview: http://www.youtube.com/user/Secunia#p/a/u/0/M1Y9sJqR2SY ---------------------------------------------------------------------- TITLE: SecureSphere Web Application Firewall Database Events Script Insertion Vulnerability SECUNIA ADVISORY ID: SA44772 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44772/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44772 RELEASE DATE: 2011-06-01 DISCUSS ADVISORY: http://secunia.com/advisories/44772/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/44772/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=44772 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in SecureSphere Web Application Firewall, which can be exploited by malicious people to conduct script insertion attacks. Certain input passed to a web server protected by SecureSphere is not properly sanitised before being displayed to the user. The vulnerability is reported in version 6.2, 7.x, and 8.x. SOLUTION: Apply patches. Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ PROVIDED AND/OR DISCOVERED BY: Sean Talbot, Dell SecureWorks ORIGINAL ADVISORY: Imperva: http://www.imperva.com/resources/adc/adc_advisories_response_secureworks.html SecureWorks: http://www.secureworks.com/research/advisories/SWRX-2011-001/ OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2011-0767 // CERT/CC: VU#567774 // JVNDB: JVNDB-2011-001705 // BID: 48062 // VULHUB: VHN-48712 // PACKETSTORM: 101907

AFFECTED PRODUCTS

vendor:impervamodel:securesphere web application firewallscope:eqversion:8.5

Trust: 1.9

vendor:impervamodel:securesphere web application firewallscope:eqversion:8.0

Trust: 1.9

vendor:impervamodel:securesphere web application firewallscope:eqversion:7.5

Trust: 1.9

vendor:impervamodel:securesphere web application firewallscope:eqversion:7.0

Trust: 1.9

vendor:impervamodel:securesphere web application firewallscope:eqversion:6.2

Trust: 1.9

vendor:impervamodel:securesphere web application firewallscope:eqversion:7.0.0.7078

Trust: 1.6

vendor:impervamodel:securesphere web application firewallscope:eqversion:7.0.0.7061

Trust: 1.6

vendor:impervamodel: - scope: - version: -

Trust: 0.8

vendor:impervamodel:securesphere web application firewallscope:eqversion:6.2 mx management server

Trust: 0.8

vendor:impervamodel:securesphere web application firewallscope:eqversion:7.x mx management server

Trust: 0.8

vendor:impervamodel:securesphere web application firewallscope:eqversion:8.x mx management server

Trust: 0.8

vendor:impervamodel:securesphere mx management serverscope:eqversion:8.5

Trust: 0.3

vendor:impervamodel:securesphere mx management serverscope:eqversion:8.0

Trust: 0.3

vendor:impervamodel:securesphere mx management serverscope:eqversion:7.5

Trust: 0.3

vendor:impervamodel:securesphere mx management serverscope:eqversion:7.0

Trust: 0.3

vendor:impervamodel:securesphere mx management serverscope:eqversion:6.2

Trust: 0.3

sources: CERT/CC: VU#567774 // BID: 48062 // JVNDB: JVNDB-2011-001705 // CNNVD: CNNVD-201106-002 // NVD: CVE-2011-0767

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-0767
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#567774
value: 1.61

Trust: 0.8

NVD: CVE-2011-0767
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201106-002
value: MEDIUM

Trust: 0.6

VULHUB: VHN-48712
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-0767
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-48712
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#567774 // VULHUB: VHN-48712 // JVNDB: JVNDB-2011-001705 // CNNVD: CNNVD-201106-002 // NVD: CVE-2011-0767

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-48712 // JVNDB: JVNDB-2011-001705 // NVD: CVE-2011-0767

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201106-002

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201106-002

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-001705

PATCH

title:Imperva Security Response for CVE-2011-0767url:http://www.imperva.com/resources/adc/adc_advisories_response_secureworks.html

Trust: 0.8

sources: JVNDB: JVNDB-2011-001705

EXTERNAL IDS

db:CERT/CCid:VU#567774

Trust: 3.6

db:NVDid:CVE-2011-0767

Trust: 2.8

db:SECUNIAid:44772

Trust: 2.6

db:XFid:67779

Trust: 1.4

db:JVNDBid:JVNDB-2011-001705

Trust: 0.8

db:CNNVDid:CNNVD-201106-002

Trust: 0.7

db:BIDid:48062

Trust: 0.4

db:VULHUBid:VHN-48712

Trust: 0.1

db:PACKETSTORMid:101907

Trust: 0.1

sources: CERT/CC: VU#567774 // VULHUB: VHN-48712 // BID: 48062 // JVNDB: JVNDB-2011-001705 // PACKETSTORM: 101907 // CNNVD: CNNVD-201106-002 // NVD: CVE-2011-0767

REFERENCES

url:http://www.imperva.com/resources/adc/adc_advisories_response_secureworks.html

Trust: 2.9

url:http://www.kb.cert.org/vuls/id/567774

Trust: 2.8

url:http://www.secureworks.com/research/advisories/swrx-2011-001/

Trust: 2.6

url:http://secunia.com/advisories/44772

Trust: 2.5

url:http://xforce.iss.net/xforce/xfdb/67779

Trust: 1.4

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/67779

Trust: 1.1

url:http://app.demand.imperva.com/e/er.aspx?s=466&lid=794&elq=fd4f3793140c4eb8b440d242b3d56e7a

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0767

Trust: 0.8

url:http://jvn.jp/cert/jvnvu567774

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0767

Trust: 0.8

url:http://www.imperva.com

Trust: 0.3

url:http://secunia.com/advisories/44772/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=44772

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://www.youtube.com/user/secunia#p/a/u/0/m1y9sjqr2sy

Trust: 0.1

url:http://secunia.com/advisories/44772/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#567774 // VULHUB: VHN-48712 // BID: 48062 // JVNDB: JVNDB-2011-001705 // PACKETSTORM: 101907 // CNNVD: CNNVD-201106-002 // NVD: CVE-2011-0767

CREDITS

Sean Talbot of Dell SecureWorks.

Trust: 0.3

sources: BID: 48062

SOURCES

db:CERT/CCid:VU#567774
db:VULHUBid:VHN-48712
db:BIDid:48062
db:JVNDBid:JVNDB-2011-001705
db:PACKETSTORMid:101907
db:CNNVDid:CNNVD-201106-002
db:NVDid:CVE-2011-0767

LAST UPDATE DATE

2025-04-11T23:19:00.038000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#567774date:2011-05-31T00:00:00
db:VULHUBid:VHN-48712date:2017-08-17T00:00:00
db:BIDid:48062date:2011-05-23T00:00:00
db:JVNDBid:JVNDB-2011-001705date:2011-06-16T00:00:00
db:CNNVDid:CNNVD-201106-002date:2011-06-15T00:00:00
db:NVDid:CVE-2011-0767date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#567774date:2011-05-31T00:00:00
db:VULHUBid:VHN-48712date:2011-06-06T00:00:00
db:BIDid:48062date:2011-05-23T00:00:00
db:JVNDBid:JVNDB-2011-001705date:2011-06-16T00:00:00
db:PACKETSTORMid:101907date:2011-06-01T11:46:40
db:CNNVDid:CNNVD-201106-002date:2011-06-03T00:00:00
db:NVDid:CVE-2011-0767date:2011-06-06T19:55:01.427