ID

VAR-201303-0030


CVE

CVE-2012-5053


TITLE

Trimble Infrastructure GNSS Series Receiver Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2013-001775

DESCRIPTION

Cross-site scripting (XSS) vulnerability in the Receiver Web User Interface on Trimble Infrastructure GNSS Series Receivers NetR3, NetR5, NetR8, and NetR9 before 4.70, and NetRS before 1.3-2, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. The Trimble Infrastructure GNSS Series Receivers is a GPS satellite receiver. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Trimble NetRS Unspecified Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA51859 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51859/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51859 RELEASE DATE: 2013-01-16 DISCUSS ADVISORY: http://secunia.com/advisories/51859/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51859/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51859 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Deloitte has reported a vulnerability in Trimble NetRS, which can be exploited by malicious people to conduct cross-site scripting attacks. Certain unspecified input is not properly sanitised before being returned to the user. The vulnerability is reported in firmware versions prior to 1.3-2. SOLUTION: Update to firmware version 1.3-2. PROVIDED AND/OR DISCOVERED BY: Fara Rustein, Deloitte. ORIGINAL ADVISORY: Trimble: http://trl.trimble.com/docushare/dsweb/Get/Document-636664/NetRS_1%203-2_RelNotes.pdf DTTAR-20130001: http://archives.neohapsis.com/archives/bugtraq/2013-01/0063.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2012-5053 // JVNDB: JVNDB-2013-001775 // CNVD: CNVD-2013-00419 // BID: 57421 // VULHUB: VHN-58334 // PACKETSTORM: 119577

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-00419

AFFECTED PRODUCTS

vendor:trimblemodel:infrastructure gnss series receiver netr5scope:eqversion: -

Trust: 1.0

vendor:trimblemodel:infrastructure gnss series receiver netr8scope:eqversion: -

Trust: 1.0

vendor:trimblemodel:infrastructure gnss series receiver netr3scope:eqversion: -

Trust: 1.0

vendor:trimblemodel:infrastructure gnss series receiver netr9scope:eqversion: -

Trust: 1.0

vendor:trimblemodel:infrastructure netrs receiverscope:eqversion: -

Trust: 1.0

vendor:trimblemodel:infrastructure gnss series receiverscope:ltversion:netr3 ( firmware 4.70 )

Trust: 0.8

vendor:trimblemodel:infrastructure gnss series receiverscope:ltversion:netr5 ( firmware 4.70 )

Trust: 0.8

vendor:trimblemodel:infrastructure gnss series receiverscope:ltversion:netr8 ( firmware 4.70 )

Trust: 0.8

vendor:trimblemodel:infrastructure gnss series receiverscope:ltversion:netr9 ( firmware 4.70 )

Trust: 0.8

vendor:trimblemodel:infrastructure gnss series receiverscope:ltversion:netrs ( firmware 1.3-2 )

Trust: 0.8

vendor:trimblemodel:infrastructure gnss series receiverscope:ltversion:1.3-2 (netrs)

Trust: 0.8

vendor:trimblemodel:infrastructure gnss series receiverscope:ltversion:4.70 (netr3

Trust: 0.8

vendor:trimblemodel:infrastructure gnss series receiverscope:eqversion:netr5

Trust: 0.8

vendor:trimblemodel:infrastructure gnss series receiverscope:eqversion:netr8

Trust: 0.8

vendor:trimblemodel:infrastructure gnss series receiverscope:eqversion:netr9)

Trust: 0.8

vendor:trimblemodel:netrsscope: - version: -

Trust: 0.6

vendor:trimblemodel:netr5scope: - version: -

Trust: 0.6

vendor:trimblemodel:netr8scope: - version: -

Trust: 0.6

vendor:trimblemodel:netr9scope: - version: -

Trust: 0.6

vendor:trimblemodel:netr3scope: - version: -

Trust: 0.6

vendor:trimblemodel:infrastructure gnss series receiversscope:eqversion:netr8

Trust: 0.6

vendor:trimblemodel:infrastructure gnss series receiversscope:eqversion:netr3

Trust: 0.6

vendor:trimblemodel:infrastructure gnss series receiversscope:eqversion:netr9

Trust: 0.6

vendor:trimblemodel:infrastructure gnss series receiversscope:eqversion:netr5

Trust: 0.6

vendor:trimblemodel:infrastructure gnss series receiversscope:eqversion:netrs

Trust: 0.6

vendor:trimblemodel:infrastructure gnss receiver netrsscope:eqversion:1.3-1

Trust: 0.3

vendor:trimblemodel:infrastructure gnss receiver netr9scope:eqversion:4.60

Trust: 0.3

vendor:trimblemodel:infrastructure gnss receiver netr8scope:eqversion:4.45

Trust: 0.3

vendor:trimblemodel:infrastructure gnss receiver netr5scope:eqversion:4.45

Trust: 0.3

vendor:trimblemodel:infrastructure gnss receiver netr3scope:eqversion:4.45

Trust: 0.3

vendor:trimblemodel:infrastructure gnss receiver netrsscope:neversion:1.3-2

Trust: 0.3

vendor:trimblemodel:infrastructure gnss receiver netr9scope:neversion:4.70

Trust: 0.3

vendor:trimblemodel:infrastructure gnss receiver netr8scope:neversion:4.70

Trust: 0.3

vendor:trimblemodel:infrastructure gnss receiver netr5scope:neversion:4.70

Trust: 0.3

vendor:trimblemodel:infrastructure gnss receiver netr3scope:neversion:4.70

Trust: 0.3

sources: CNVD: CNVD-2013-00419 // BID: 57421 // JVNDB: JVNDB-2013-001775 // CNNVD: CNNVD-201301-437 // NVD: CVE-2012-5053

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-5053
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-5053
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201301-437
value: MEDIUM

Trust: 0.6

VULHUB: VHN-58334
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-5053
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-58334
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-58334 // JVNDB: JVNDB-2013-001775 // CNNVD: CNNVD-201301-437 // NVD: CVE-2012-5053

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-58334 // JVNDB: JVNDB-2013-001775 // NVD: CVE-2012-5053

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201301-437

TYPE

xss

Trust: 0.8

sources: PACKETSTORM: 119572 // PACKETSTORM: 119577 // CNNVD: CNNVD-201301-437

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-001775

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-58334

PATCH

title:Infrastructure_GNSS-SeriesReceivers_4.70_RelNotes.pdfurl:http://trl.trimble.com/docushare/dsweb/Get/Document-644791/Infrastructure_GNSS-SeriesReceivers_4.70_RelNotes.pdf

Trust: 0.8

title:NetRS_1 3-2_RelNotes.pdfurl:http://trl.trimble.com/docushare/dsweb/Get/Document-636664/NetRS_1%203-2_RelNotes.pdf

Trust: 0.8

title:Patch for Trimble Infrastructure GNSS Series Receivers Cross-Site Scripting Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/29771

Trust: 0.6

sources: CNVD: CNVD-2013-00419 // JVNDB: JVNDB-2013-001775

EXTERNAL IDS

db:NVDid:CVE-2012-5053

Trust: 3.5

db:BIDid:57421

Trust: 1.0

db:JVNDBid:JVNDB-2013-001775

Trust: 0.8

db:SECUNIAid:51859

Trust: 0.7

db:CNNVDid:CNNVD-201301-437

Trust: 0.7

db:CNVDid:CNVD-2013-00419

Trust: 0.6

db:BUGTRAQid:20130115 TRIMBLE(R) INFRASTRUCTURE GNSS SERIES RECEIVERS CROSS SITE SCRIPTING (XSS) VULNERABILITY

Trust: 0.6

db:PACKETSTORMid:119572

Trust: 0.2

db:VULHUBid:VHN-58334

Trust: 0.1

db:PACKETSTORMid:119577

Trust: 0.1

sources: CNVD: CNVD-2013-00419 // VULHUB: VHN-58334 // BID: 57421 // JVNDB: JVNDB-2013-001775 // PACKETSTORM: 119572 // PACKETSTORM: 119577 // CNNVD: CNNVD-201301-437 // NVD: CVE-2012-5053

REFERENCES

url:http://trl.trimble.com/docushare/dsweb/get/document-636664/netrs_1%203-2_relnotes.pdf

Trust: 2.2

url:http://trl.trimble.com/docushare/dsweb/get/document-644791/infrastructure_gnss-seriesreceivers_4.70_relnotes.pdf

Trust: 2.1

url:http://archives.neohapsis.com/archives/bugtraq/2013-01/0063.html

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5053

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-5053

Trust: 0.8

url:http://secunia.com/advisories/51859/

Trust: 0.7

url:http://www.securityfocus.com/bid/57421

Trust: 0.6

url:http://www.trimble.com/infrastructure/hardware.aspx

Trust: 0.3

url:https://www.deloitte.com/ar

Trust: 0.1

url:http://www.deloitte.com/about.

Trust: 0.1

url:http://www.deloitte.com/about

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5053

Trust: 0.1

url:http://www.trimble.com/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51859

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/51859/#comments

Trust: 0.1

sources: CNVD: CNVD-2013-00419 // VULHUB: VHN-58334 // BID: 57421 // JVNDB: JVNDB-2013-001775 // PACKETSTORM: 119572 // PACKETSTORM: 119577 // CNNVD: CNNVD-201301-437 // NVD: CVE-2012-5053

CREDITS

Fara Rustein

Trust: 0.9

sources: BID: 57421 // CNNVD: CNNVD-201301-437

SOURCES

db:CNVDid:CNVD-2013-00419
db:VULHUBid:VHN-58334
db:BIDid:57421
db:JVNDBid:JVNDB-2013-001775
db:PACKETSTORMid:119572
db:PACKETSTORMid:119577
db:CNNVDid:CNNVD-201301-437
db:NVDid:CVE-2012-5053

LAST UPDATE DATE

2025-04-11T22:53:22.936000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-00419date:2013-01-21T00:00:00
db:VULHUBid:VHN-58334date:2013-03-07T00:00:00
db:BIDid:57421date:2013-01-15T00:00:00
db:JVNDBid:JVNDB-2013-001775date:2013-03-08T00:00:00
db:CNNVDid:CNNVD-201301-437date:2013-03-07T00:00:00
db:NVDid:CVE-2012-5053date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-00419date:2013-01-21T00:00:00
db:VULHUBid:VHN-58334date:2013-03-07T00:00:00
db:BIDid:57421date:2013-01-15T00:00:00
db:JVNDBid:JVNDB-2013-001775date:2013-03-08T00:00:00
db:PACKETSTORMid:119572date:2013-01-16T02:24:04
db:PACKETSTORMid:119577date:2013-01-16T11:36:00
db:CNNVDid:CNNVD-201301-437date:2013-01-23T00:00:00
db:NVDid:CVE-2012-5053date:2013-03-07T00:55:01.150