SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   HPE OpenView Network Node Manager Vendors:   HPE
(HP Issues Fix for OpenView NNM) Apache Input Validation Hole in mod_status Permits Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1021261
SecurityTracker URL:  http://securitytracker.com/id/1021261
CVE Reference:   CVE-2007-6388   (Links to External Site)
Date:  Nov 20 2008
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.01, 7.51, 7.53
Description:   A vulnerability was reported in Apache mod_status. A remote user can conduct cross-site scripting attacks. HP OpenView Network Node Manager is affected.

The mod_status module does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Apache software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Apache software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   HP has issued a fix for HP OpenView Network Node Manager, which is affected by this vulnerability.

The patches are available at:

http://itrc.hp.com

OV NNM v7.53:

HP-UX (IA) - PHSS_38148 or subsequent

HP-UX (PA) - PHSS_38147 or subsequent

Linux RedHatAS2.1 - LXOV_00085 or subsequent

Linux RedHat4AS-x86_64 - LXOV_00086 or subsequent

Solaris - PSOV_03514 or subsequent

For OV NNM v7.51, upgrade to NNM v7.53 and install the patches listed above.

OV NNM v7.01:

HP-UX (PA) - PHSS_38761 or subsequent

Solaris - PSOV_03516 or subsequent

The HP advisory is available at:

https://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01607570

Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (HP/UX), UNIX (Solaris - SunOS)

Message History:   This archive entry is a follow-up to the message listed below.
Jan 5 2008 Apache Input Validation Hole in mod_status Permits Cross-Site Scripting Attacks



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC