製品・ソフトウェアに関する情報
SpringSource Hyperic HQ などの製品の hq/web/common/GenericError.jsp におけるクロスサイトスクリプティングの脆弱性
Title SpringSource Hyperic HQ などの製品の hq/web/common/GenericError.jsp におけるクロスサイトスクリプティングの脆弱性
Summary

SpringSource Hyperic HQ、Application Management Suite (AMS)、および tc Server の Web インターフェースのジェネリック例外ハンドラの hq/web/common/GenericError.jsp には、クロスサイトスクリプティングの脆弱性が存在します。

Possible impacts 第三者により、数値パラメータへの無効な値を介して、任意の Web スクリプトまたは HTML を挿入される可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Oct. 13, 2009, midnight
Registration Date Dec. 20, 2012, 7:28 p.m.
Last Update Dec. 20, 2012, 7:28 p.m.
CVSS2.0 : 警告
Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:P/A:N
Affected System
SpringSource
application management suite 2.0.0.SR3
Hyperic HQ 3.2.6.1 未満の 3.2.x、4.0.3.1 未満の 4.0.x、4.1.2.1 未満の 4.1.x、および 4.2-beta1
tc server 6.0.20.B
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2012年12月20日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2009-2897
Summary

Multiple cross-site scripting (XSS) vulnerabilities in hq/web/common/GenericError.jsp in the generic exception handler in the web interface in SpringSource Hyperic HQ 3.2.x before 3.2.6.1, 4.0.x before 4.0.3.1, 4.1.x before 4.1.2.1, and 4.2-beta1; Application Management Suite (AMS) 2.0.0.SR3; and tc Server 6.0.20.B allow remote attackers to inject arbitrary web script or HTML via invalid values for numerical parameters, as demonstrated by an uncaught java.lang.NumberFormatException exception resulting from (1) the typeId parameter to mastheadAttach.do, (2) the eid parameter to Resource.do, and (3) the u parameter in a view action to admin/user/UserAdmin.do. NOTE: some of these details are obtained from third party information.

Publication Date Oct. 13, 2009, 7:30 p.m.
Registration Date Jan. 29, 2021, 1:22 p.m.
Last Update Oct. 11, 2018, 4:42 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:springsource:application_management_suite:2.0.0:sr3:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:3.2:beta_1:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:3.2.6:*:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:springsource:hyperic_hq:4.2:beta_1:*:*:*:*:*:*
cpe:2.3:a:springsource:tc_server:6.0.20:b:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List