var-200711-0397
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in the management console in Blue Coat ProxySG before 4.2.6.1, and 5.x before 5.2.2.5, allows remote attackers to inject arbitrary web script or HTML by modifying the URL that is used for loading Certificate Revocation Lists. Blue Coat ProxySG Management Console is prone to two cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. Versions prior to ProxySG 4.2.6.1 and 5.2.2.5 are vulnerable. NOTE: This BID originally covered one issue, but was updated to also cover a second issue.
2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively.
Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv
TITLE: Blue Coat ProxySG SGOS Cross-Site Scripting Vulnerability
SECUNIA ADVISORY ID: SA27452
VERIFY ADVISORY: http://secunia.com/advisories/27452/
CRITICAL: Less critical
IMPACT: Cross Site Scripting
WHERE:
From remote
OPERATING SYSTEM: Blue Coat Security Gateway OS (SGOS) 4.x http://secunia.com/product/5419/ Blue Coat Security Gateway OS (SGOS) 5.x http://secunia.com/product/12422/
DESCRIPTION: A vulnerability has been reported in the Blue Coat ProxySG SGOS, which can be exploited by malicious people to conduct cross-site scripting attacks.
Input passed to unspecified parameters when loading "Certificate Revocation Lists" via the management console is not properly sanitised before being returned to the user.
SOLUTION: Update to version 4.2.6.1 or 5.2.2.5.
PROVIDED AND/OR DISCOVERED BY: The vendor credits Adrian Pastor of ProCheckUp.
ORIGINAL ADVISORY: http://www.bluecoat.com/support/securityadvisories/advisory_cross-site_scripting_vulnerability
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200711-0397", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "proxysg", "scope": "lt", "trust": 1.0, "vendor": "symantec", "version": "5.2.2.5" }, { "model": "proxysg", "scope": "gte", "trust": 1.0, "vendor": "symantec", "version": "5.0.0" }, { "model": "proxysg", "scope": "lt", "trust": 1.0, "vendor": "symantec", "version": "4.2.6.1" }, { "model": "proxysg", "scope": "eq", "trust": 0.8, "vendor": "blue coat", "version": "5.2.2.5" }, { "model": "proxysg", "scope": "lt", "trust": 0.8, "vendor": "blue coat", "version": "5.x" }, { "model": "proxysg", "scope": "eq", "trust": 0.6, "vendor": "bluecoat", "version": "5.2.2.4" }, { "model": "proxysg", "scope": "eq", "trust": 0.6, "vendor": "bluecoat", "version": "4.2.6" }, { "model": "coat systems sgos", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "4.1.2" }, { "model": "coat systems proxysg", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "0" }, { "model": "coat systems sgos", "scope": "ne", "trust": 0.3, "vendor": "blue", "version": "5.2.2.5" }, { "model": "coat systems sgos", "scope": "ne", "trust": 0.3, "vendor": "blue", "version": "4.2.6.1" } ], "sources": [ { "db": "BID", "id": "26286" }, { "db": "JVNDB", "id": "JVNDB-2007-002864" }, { "db": "CNNVD", "id": "CNNVD-200711-035" }, { "db": "NVD", "id": "CVE-2007-5796" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:bluecoat:proxysg", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-002864" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor credits Adrian Pastor with the discovery of this issue.", "sources": [ { "db": "BID", "id": "26286" }, { "db": "CNNVD", "id": "CNNVD-200711-035" } ], "trust": 0.9 }, "cve": "CVE-2007-5796", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2007-5796", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-5796", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2007-5796", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200711-035", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-002864" }, { "db": "CNNVD", "id": "CNNVD-200711-035" }, { "db": "NVD", "id": "CVE-2007-5796" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in the management console in Blue Coat ProxySG before 4.2.6.1, and 5.x before 5.2.2.5, allows remote attackers to inject arbitrary web script or HTML by modifying the URL that is used for loading Certificate Revocation Lists. Blue Coat ProxySG Management Console is prone to two cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. \nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. \nVersions prior to ProxySG 4.2.6.1 and 5.2.2.5 are vulnerable. \nNOTE: This BID originally covered one issue, but was updated to also cover a second issue. \n\n----------------------------------------------------------------------\n\n2003: 2,700 advisories published\n2004: 3,100 advisories published\n2005: 4,600 advisories published\n2006: 5,300 advisories published\n\nHow do you know which Secunia advisories are important to you?\n\nThe Secunia Vulnerability Intelligence Solutions allows you to filter\nand structure all the information you need, so you can address issues\neffectively. \n\nGet a free trial of the Secunia Vulnerability Intelligence Solutions:\nhttp://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv\n\n----------------------------------------------------------------------\n\nTITLE:\nBlue Coat ProxySG SGOS Cross-Site Scripting Vulnerability\n\nSECUNIA ADVISORY ID:\nSA27452\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/27452/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nCross Site Scripting\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nBlue Coat Security Gateway OS (SGOS) 4.x\nhttp://secunia.com/product/5419/\nBlue Coat Security Gateway OS (SGOS) 5.x\nhttp://secunia.com/product/12422/\n\nDESCRIPTION:\nA vulnerability has been reported in the Blue Coat ProxySG SGOS,\nwhich can be exploited by malicious people to conduct cross-site\nscripting attacks. \n\nInput passed to unspecified parameters when loading \"Certificate\nRevocation Lists\" via the management console is not properly\nsanitised before being returned to the user. \n\nSOLUTION:\nUpdate to version 4.2.6.1 or 5.2.2.5. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Adrian Pastor of ProCheckUp. \n\nORIGINAL ADVISORY:\nhttp://www.bluecoat.com/support/securityadvisories/advisory_cross-site_scripting_vulnerability\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-5796" }, { "db": "JVNDB", "id": "JVNDB-2007-002864" }, { "db": "BID", "id": "26286" }, { "db": "PACKETSTORM", "id": "60621" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-5796", "trust": 2.7 }, { "db": "SECUNIA", "id": "27452", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2007-3678", "trust": 1.6 }, { "db": "SECTRACK", "id": "1018888", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2007-002864", "trust": 0.8 }, { "db": "XF", "id": "38213", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200711-035", "trust": 0.6 }, { "db": "BID", "id": "26286", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "60621", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "26286" }, { "db": "JVNDB", "id": "JVNDB-2007-002864" }, { "db": "PACKETSTORM", "id": "60621" }, { "db": "CNNVD", "id": "CNNVD-200711-035" }, { "db": "NVD", "id": "CVE-2007-5796" } ] }, "id": "VAR-200711-0397", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.48857144 }, "last_update_date": "2024-11-23T23:13:16.820000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.bluecoat.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-002864" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-002864" }, { "db": "NVD", "id": "CVE-2007-5796" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.bluecoat.com/support/securityadvisories/advisory_cross-site_scripting_vulnerability" }, { "trust": 1.6, "url": "http://secunia.com/advisories/27452" }, { "trust": 1.6, "url": "http://www.securitytracker.com/id?1018888" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/3678" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38213" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5796" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-5796" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2007/3678" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/38213" }, { "trust": 0.3, "url": "http://hypersonic.bluecoat.com/support/securityadvisories/advisory_cross-site_scripting_vulnerability" }, { "trust": 0.3, "url": "http://www.bluecoat.com/products/sg" }, { "trust": 0.3, "url": "/archive/1/483124" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/5419/" }, { "trust": 0.1, "url": "http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv" }, { "trust": 0.1, "url": "http://secunia.com/advisories/27452/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/12422/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "BID", "id": "26286" }, { "db": "JVNDB", "id": "JVNDB-2007-002864" }, { "db": "PACKETSTORM", "id": "60621" }, { "db": "CNNVD", "id": "CNNVD-200711-035" }, { "db": "NVD", "id": "CVE-2007-5796" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "26286" }, { "db": "JVNDB", "id": "JVNDB-2007-002864" }, { "db": "PACKETSTORM", "id": "60621" }, { "db": "CNNVD", "id": "CNNVD-200711-035" }, { "db": "NVD", "id": "CVE-2007-5796" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-10-29T00:00:00", "db": "BID", "id": "26286" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-002864" }, { "date": "2007-11-02T16:12:25", "db": "PACKETSTORM", "id": "60621" }, { "date": "2007-11-02T00:00:00", "db": "CNNVD", "id": "CNNVD-200711-035" }, { "date": "2007-11-03T00:46:00", "db": "NVD", "id": "CVE-2007-5796" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-11-15T00:38:00", "db": "BID", "id": "26286" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-002864" }, { "date": "2007-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200711-035" }, { "date": "2024-11-21T00:38:42.847000", "db": "NVD", "id": "CVE-2007-5796" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200711-035" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Blue Coat ProxySG Management console cross-site scripting vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-002864" }, { "db": "CNNVD", "id": "CNNVD-200711-035" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xss", "sources": [ { "db": "PACKETSTORM", "id": "60621" }, { "db": "CNNVD", "id": "CNNVD-200711-035" } ], "trust": 0.7 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.