FKIE_CVE-2009-2897

Vulnerability from fkie_nvd - Published: 2009-10-13 10:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in hq/web/common/GenericError.jsp in the generic exception handler in the web interface in SpringSource Hyperic HQ 3.2.x before 3.2.6.1, 4.0.x before 4.0.3.1, 4.1.x before 4.1.2.1, and 4.2-beta1; Application Management Suite (AMS) 2.0.0.SR3; and tc Server 6.0.20.B allow remote attackers to inject arbitrary web script or HTML via invalid values for numerical parameters, as demonstrated by an uncaught java.lang.NumberFormatException exception resulting from (1) the typeId parameter to mastheadAttach.do, (2) the eid parameter to Resource.do, and (3) the u parameter in a view action to admin/user/UserAdmin.do. NOTE: some of these details are obtained from third party information.
References
secalert@redhat.comhttp://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=advisory&name=Hyperic_HQ_Multiple_XSSExploit, Patch
secalert@redhat.comhttp://forums.hyperic.com/jiveforums/thread.jspa?messageID=22156&#22156
secalert@redhat.comhttp://jira.hyperic.com/browse/HHQ-2655Exploit
secalert@redhat.comhttp://secunia.com/advisories/36935Vendor Advisory
secalert@redhat.comhttp://www.coresecurity.com/content/hyperic-hq-vulnerabilitiesExploit, Patch
secalert@redhat.comhttp://www.osvdb.org/58608
secalert@redhat.comhttp://www.osvdb.org/58609
secalert@redhat.comhttp://www.osvdb.org/58610
secalert@redhat.comhttp://www.securityfocus.com/archive/1/506935/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/506936/100/0/threaded
secalert@redhat.comhttp://www.springsource.com/security/hyperic-hqPatch, Vendor Advisory
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/53658
af854a3a-2127-422b-91ae-364da2661108http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=advisory&name=Hyperic_HQ_Multiple_XSSExploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://forums.hyperic.com/jiveforums/thread.jspa?messageID=22156&#22156
af854a3a-2127-422b-91ae-364da2661108http://jira.hyperic.com/browse/HHQ-2655Exploit
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36935Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.coresecurity.com/content/hyperic-hq-vulnerabilitiesExploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/58608
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/58609
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/58610
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/506935/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/506936/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.springsource.com/security/hyperic-hqPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/53658

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:springsource:application_management_suite:2.0.0:sr3:*:*:*:*:*:*",
              "matchCriteriaId": "2B49CBBA-35CB-42A6-93D5-06C8F203C98B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2:beta_1:*:*:*:*:*:*",
              "matchCriteriaId": "E4DEFE03-6FCD-49C5-A0E7-370FEA7CF5B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A6E9004-B756-42BE-8918-691AF6F720FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F926074F-8BD2-4A30-B938-CA84E9533CAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3D6A50-33C3-4932-8A10-37BFF8D061E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "41519C07-5A0D-48ED-81B5-ABF712A6AB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "44A5F7C5-A739-4887-AE92-721426E404F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F7EB2C3-639B-41B6-B23B-BEBE45EE1DCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCA25CF4-9C98-4FED-A75E-68EF0B9E2C2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE0EC4F9-11EE-4326-A7C4-681CB451C45E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F45C4E-F068-44A0-B676-444D913B3719",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "602855A5-B269-46BD-B68E-DAA49B818A63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDDBC79C-1930-4474-94EE-1F046539F2C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BA42759-E3E8-4F6C-9542-FB939D9D2042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FD405E4-D6B2-41AB-AE19-024192E8B25C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC192682-AE08-4651-9C29-0753E2F85D65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.2:beta_1:*:*:*:*:*:*",
              "matchCriteriaId": "3754D8A2-B5F6-44A9-BC1D-7A4FE925D070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:springsource:tc_server:6.0.20:b:*:*:*:*:*:*",
              "matchCriteriaId": "BC0FD679-8EB8-4F3D-8310-361E6AAC9299",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in hq/web/common/GenericError.jsp in the generic exception handler in the web interface in SpringSource Hyperic HQ 3.2.x before 3.2.6.1, 4.0.x before 4.0.3.1, 4.1.x before 4.1.2.1, and 4.2-beta1; Application Management Suite (AMS) 2.0.0.SR3; and tc Server 6.0.20.B allow remote attackers to inject arbitrary web script or HTML via invalid values for numerical parameters, as demonstrated by an uncaught java.lang.NumberFormatException exception resulting from (1) the typeId parameter to mastheadAttach.do, (2) the eid parameter to Resource.do, and (3) the u parameter in a view action to admin/user/UserAdmin.do.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en hq/web/common/GenericError.jsp en el manejador de excepciones en la interface web en SpringSource Hyperic HQ v3.2.x anterior v3.2.6.1, v4.0.x anterior v4.0.3.1, v4.1.x anterior v4.1.2.1, y v4.2-beta1; Application Management Suite (AMS) v2.0.0.SR3; y tc Server v6.0.20.B permite a atacantes remotos ejecutar c\u00f3digo web o HTML a su elecci\u00f3n a trav\u00e9s de valores no validos para los par\u00e1metros num\u00e9ricos, como qued\u00f3 demostrado en la excepci\u00f3n no capturada java.lang.NumberFormatException resultado del (1) par\u00e1metro typeId en mastheadAttach.do, (2) el par\u00e1metro eid en Resource.do, y(3) el par\u00e1metro u en una acci\u00f3n view en admin/user/UserAdmin.do."
    }
  ],
  "id": "CVE-2009-2897",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-10-13T10:30:00.500",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://corelabs.coresecurity.com/index.php?module=Wiki\u0026action=view\u0026type=advisory\u0026name=Hyperic_HQ_Multiple_XSS"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://forums.hyperic.com/jiveforums/thread.jspa?messageID=22156\u0026#22156"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://jira.hyperic.com/browse/HHQ-2655"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36935"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.coresecurity.com/content/hyperic-hq-vulnerabilities"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/58608"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/58609"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/58610"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/506935/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/506936/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.springsource.com/security/hyperic-hq"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://corelabs.coresecurity.com/index.php?module=Wiki\u0026action=view\u0026type=advisory\u0026name=Hyperic_HQ_Multiple_XSS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://forums.hyperic.com/jiveforums/thread.jspa?messageID=22156\u0026#22156"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://jira.hyperic.com/browse/HHQ-2655"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36935"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.coresecurity.com/content/hyperic-hq-vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/58608"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/58609"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/58610"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/506935/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/506936/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.springsource.com/security/hyperic-hq"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53658"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…