CVE-2009-2897
Published Oct 13, 2009
Last updated 6 years ago
Overview
- Description
- Multiple cross-site scripting (XSS) vulnerabilities in hq/web/common/GenericError.jsp in the generic exception handler in the web interface in SpringSource Hyperic HQ 3.2.x before 3.2.6.1, 4.0.x before 4.0.3.1, 4.1.x before 4.1.2.1, and 4.2-beta1; Application Management Suite (AMS) 2.0.0.SR3; and tc Server 6.0.20.B allow remote attackers to inject arbitrary web script or HTML via invalid values for numerical parameters, as demonstrated by an uncaught java.lang.NumberFormatException exception resulting from (1) the typeId parameter to mastheadAttach.do, (2) the eid parameter to Resource.do, and (3) the u parameter in a view action to admin/user/UserAdmin.do. NOTE: some of these details are obtained from third party information.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:springsource:application_management_suite:2.0.0:sr3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B49CBBA-35CB-42A6-93D5-06C8F203C98B" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2:beta_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4DEFE03-6FCD-49C5-A0E7-370FEA7CF5B9" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A6E9004-B756-42BE-8918-691AF6F720FC" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F926074F-8BD2-4A30-B938-CA84E9533CAE" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A3D6A50-33C3-4932-8A10-37BFF8D061E8" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41519C07-5A0D-48ED-81B5-ABF712A6AB04" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44A5F7C5-A739-4887-AE92-721426E404F5" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F7EB2C3-639B-41B6-B23B-BEBE45EE1DCD" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCA25CF4-9C98-4FED-A75E-68EF0B9E2C2C" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE0EC4F9-11EE-4326-A7C4-681CB451C45E" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90F45C4E-F068-44A0-B676-444D913B3719" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "602855A5-B269-46BD-B68E-DAA49B818A63" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CDDBC79C-1930-4474-94EE-1F046539F2C4" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BA42759-E3E8-4F6C-9542-FB939D9D2042" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FD405E4-D6B2-41AB-AE19-024192E8B25C" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC192682-AE08-4651-9C29-0753E2F85D65" }, { "criteria": "cpe:2.3:a:springsource:hyperic_hq:4.2:beta_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3754D8A2-B5F6-44A9-BC1D-7A4FE925D070" }, { "criteria": "cpe:2.3:a:springsource:tc_server:6.0.20:b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC0FD679-8EB8-4F3D-8310-361E6AAC9299" } ], "operator": "OR" } ] } ]