製品・ソフトウェアに関する情報
Hitachi JP1/HiCommand Device Manager におけるクロスサイトスクリプティングの脆弱性
Title Hitachi JP1/HiCommand Device Manager におけるクロスサイトスクリプティングの脆弱性
Summary

Hitachi JP1/HiCommand Device Manager、Tiered Storage Manager、Replication Monitor、および GlobalLink Availability Manager には、クロスサイトスクリプティングの脆弱性が存在します。

Possible impacts 第三者により、Expect HTTP ヘッダを介して、任意の Web スクリプトまたは HTML を挿入される可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date July 6, 2007, midnight
Registration Date Sept. 25, 2012, 4:47 p.m.
Last Update Sept. 25, 2012, 4:47 p.m.
CVSS2.0 : 警告
Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:P/A:N
Affected System
日立
JP1/HiCommand Device Manager 
JP1/HiCommand Global Link Availability Manager 20070528 未満
JP1/HiCommand Replication Monitor 
JP1/HiCommand Tiered Storage Manager 
CVE (情報セキュリティ 共通脆弱性識別子)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2012年09月25日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2007-3623
Summary

Cross-site scripting (XSS) vulnerability in the Hitachi JP1/HiCommand Device Manager, Tiered Storage Manager, Replication Monitor, and GlobalLink Availability Manager before 20070528 allows remote attackers to inject arbitrary web script or HTML via the Expect HTTP header.

Publication Date July 10, 2007, 1:30 a.m.
Registration Date Jan. 29, 2021, 2:16 p.m.
Last Update July 29, 2017, 10:32 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:hitachi:jp1-hicommand_device_manager:02_30:*:solaris:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_device_manager:02_30:*:windows:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_00:*:solaris:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_00:*:windows:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_10:*:linux:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_50:*:linux:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_50:*:solaris:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_50:*:windows:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_global_link_availability_manager:05_00:*:windows:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:04_00:*:solaris:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:04_00:*:windows:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_00:*:solaris:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_00:*:windows:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_50:*:solaris:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_50:*:windows:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:04_00:*:windows:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:04_30:*:solaris:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_00:*:solaris:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_00:*:windows:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_50:*:solaris:*:*:*:*:*
cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_50:*:windows:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List