fkie_cve-2009-1418
Vulnerability from fkie_nvd
Published
2009-05-19 19:30
Modified
2024-11-21 01:02
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in HP System Management Homepage (SMH) before 3.0.1.73 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*", "matchCriteriaId": "904009FC-0506-4119-A26D-7CF3CE5EBDEE", "versionEndIncluding": "3.0.0-68", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD9A9442-18B7-4858-AB3A-19FE272A5C61", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "90042282-9151-4D8E-8093-D85E57BD332C", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.1.104:*:*:*:*:*:*:*", "matchCriteriaId": "5FDEA64C-7511-4E71-8DFA-6E66531AC461", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D3EF92B4-AAC3-4957-9D8F-1796C2045962", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.2.106:*:*:*:*:*:*:*", "matchCriteriaId": "F304AB45-8298-4426-91B3-B99ED7FF6C50", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D44CEFC1-CE95-4549-A981-C3F259075B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-103:*:*:*:*:*:*:*", "matchCriteriaId": "1C035D5C-90ED-4259-B05C-BEF93D81F42F", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-103\\(a\\):*:*:*:*:*:*:*", "matchCriteriaId": "824996A5-C2CC-4FC5-8705-F6B4D69F39B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-109:*:*:*:*:*:*:*", "matchCriteriaId": "7DBF9F0E-AA30-4E5A-B23E-DD895303245C", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-118:*:*:*:*:*:*:*", "matchCriteriaId": "DA2005B3-1914-4B4B-892A-8CCC0F39EF6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0.121:*:*:*:*:*:*:*", "matchCriteriaId": "61ED0B94-3CC3-427C-A038-90C6CEF768BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "CFA42455-F9B9-49BD-BAFA-4A02C554ECE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6426924C-AA5C-4C93-AB8B-9314CD010139", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2-127:*:*:*:*:*:*:*", "matchCriteriaId": "4D7DCF4F-609A-497B-A32E-3D946EC2EE07", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2.127:*:*:*:*:*:*:*", "matchCriteriaId": "ECEAE287-0A13-4DB3-A36D-BD50148BE9B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A6E5C789-9827-47DF-A47C-454DF7687E59", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.3.132:*:*:*:*:*:*:*", "matchCriteriaId": "D85F0390-B076-4B54-9E4E-67472FF3759E", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "29FE29FC-AD24-4C89-9AAC-9D49C54A5CC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4-143:*:*:*:*:*:*:*", "matchCriteriaId": "0ECF53BE-0E3A-41F8-AFD2-29CA3F2D0C22", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4.143:*:*:*:*:*:*:*", "matchCriteriaId": "A8D25EAF-145F-4D96-836E-1B7C3FE53E47", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "20EBB25A-A1DE-4943-9EE5-0FCF21A55666", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5-146:*:*:*:*:*:*:*", "matchCriteriaId": "C43EF082-E9AB-41D3-B7AF-936B84BB6AEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5.146:*:*:*:*:*:*:*", "matchCriteriaId": "AA5379C7-0061-4C53-8B81-45F8063956DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5.146:b:*:*:*:*:*:*", "matchCriteriaId": "FD94C7BD-B398-42BF-9FB9-EB4581AF98E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B61485E4-6EC1-4886-AB47-F5BC8E72A08A", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6-156:*:*:*:*:*:*:*", "matchCriteriaId": "203163D8-15E8-4F2D-A807-7643EA0D6920", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6.156:*:*:*:*:*:*:*", "matchCriteriaId": "EBF2CB88-3E10-48BF-8D49-994A3E6014E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "2E354FF4-5CDD-4B79-B56C-2C774B235D78", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7-168:*:*:*:*:*:*:*", "matchCriteriaId": "DAC9CEFE-23C2-4455-BE6F-51D26487D3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7.168:*:*:*:*:*:*:*", "matchCriteriaId": "BF1A3FCF-B0AD-45DF-96D3-09BE755F94A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "B3DACC6F-DCE8-4890-BE47-488CB7B2DF77", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8-177:*:*:*:*:*:*:*", "matchCriteriaId": "4D0DA8D6-3B1D-4935-855E-9431EB4BA683", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8.179:*:*:*:*:*:*:*", "matchCriteriaId": "D75CC6FB-FB51-42DD-B708-54A99B10F70A", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "8AFAF26C-7BFE-479E-880C-B13E78780625", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.9-178:*:*:*:*:*:*:*", "matchCriteriaId": "FC95912B-8C95-4CA8-BDA7-76074E20E362", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "3162C720-A042-48D8-A598-5CC9845C5715", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10-186:*:*:*:*:*:*:*", "matchCriteriaId": "DEDD728B-9E92-4EC8-BD61-6E1AE300CE35", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:*:*:*:*:*:*:*", "matchCriteriaId": "73D573A1-93F3-4652-9E64-EDED09731EF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:b:*:*:*:*:*:*", "matchCriteriaId": "8B6EF4B8-AF43-4777-9556-CA6DFF864B7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:c:*:*:*:*:*:*", "matchCriteriaId": "42050FEF-5456-4340-9AD1-00448E4B5E34", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "ABEEE1E4-1883-411E-A4BA-985041880439", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11-197:*:*:*:*:*:*:*", "matchCriteriaId": "7E3E3BC1-A986-4942-80FA-5911428F8E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11.197:a:*:*:*:*:*:*", "matchCriteriaId": "96B6DA99-20FA-4622-8F1C-3086143CAE90", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12-118:*:*:*:*:*:*:*", "matchCriteriaId": "7038AC00-8A30-49CB-956D-715053A920D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12-200:*:*:*:*:*:*:*", "matchCriteriaId": "F425004A-EC16-44E8-A297-21F33F802FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12.201:*:*:*:*:*:*:*", "matchCriteriaId": "849BE02B-513B-405E-A430-DF9D02C0A666", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.14.20:*:*:*:*:*:*:*", "matchCriteriaId": "C46B2D3D-1B9A-4AE4-BDE2-4E6C388356EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.15-210:*:*:*:*:*:*:*", "matchCriteriaId": "BD611329-F5D3-455D-A275-4D61429357E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.15.210:*:*:*:*:*:*:*", "matchCriteriaId": "09857263-747C-40F5-9744-21FD03187CA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "2C14DB20-E22E-466E-A3CD-C841CFDF2A6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "8881820B-29B4-41DB-AEED-5513A347E290", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.0.64:*:*:*:*:*:*:*", "matchCriteriaId": "C78C2C5A-F788-4F25-BD19-50C76C802329", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in HP System Management Homepage (SMH) before 3.0.1.73 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en HP System Management Homepage (SMH) anteriores a v3.0.1.73 permite a atacantes remotos inyectar secuencias de comandos web o HTML de forma arbitraria a trav\u00e9s de vectores inespec\u00edficos." } ], "evaluatorComment": "Per: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01745065\r\n\r\n\r\n\"SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.\r\n\r\nHP System Management Homepage (SMH) before v3.0.1.73 running on Linux and Windows Server 2003, 2008.\"", "id": "CVE-2009-1418", "lastModified": "2024-11-21T01:02:24.810", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-05-19T19:30:00.797", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01745065" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01745065" }, { "source": "cve@mitre.org", "url": "http://jvn.jp/en/jp/JVN02331156/index.html" }, { "source": "cve@mitre.org", "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000029.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/35108" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1022242" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/35031" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01745065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01745065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN02331156/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/35108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1022242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/35031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50633" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.