ID
VAR-E-201105-0014
CVE
cve_id: | CVE-2011-0959 | Trust: 2.4 |
cve_id: | CVE-2011-0960 | Trust: 0.5 |
cve_id: | CVE-2011-0961 | Trust: 0.5 |
cve_id: | CVE-2011-0962 | Trust: 0.5 |
cve_id: | CVE-2011-0966 | Trust: 0.5 |
EDB ID
35763
TITLE
Cisco Unified Operations Manager 8.5 - 'iptm/ddv.do?deviceInstanceName' Cross-Site Scripting - Hardware remote Exploit
Trust: 0.6
DESCRIPTION
Cisco Unified Operations Manager 8.5 - 'iptm/ddv.do?deviceInstanceName' Cross-Site Scripting. CVE-2011-0959CVE-72417 . remote exploit for Hardware platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | cisco | model: | unified operations manager | scope: | eq | version: | 8.5 | Trust: 1.3 |
vendor: | cisco | model: | unified operations manager | scope: | - | version: | - | Trust: 0.5 |
vendor: | cisco | model: | unified operations manager | scope: | eq | version: | 2.0.3 | Trust: 0.3 |
vendor: | cisco | model: | unified operations manager | scope: | eq | version: | 2.0.2 | Trust: 0.3 |
vendor: | cisco | model: | unified operations manager | scope: | eq | version: | 2.0.1 | Trust: 0.3 |
vendor: | cisco | model: | unified operations manager | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | cisco | model: | unified operations manager | scope: | eq | version: | 2.3 | Trust: 0.3 |
vendor: | cisco | model: | unified operations manager | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | cisco | model: | unified operations manager sp1 | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | cisco | model: | unified operations manager | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | cisco | model: | unified operations manager | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | cisco | model: | unified operations manager | scope: | ne | version: | 8.6 | Trust: 0.3 |
EXPLOIT
source: https://www.securityfocus.com/bid/47901/info
Cisco Unified Operations Manager is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials. Other attacks may also be possible.
This issue is being tracked by Cisco Bug ID CSCtn61716.
Cisco Unified Operations Manager versions prior to 8.6 are vulnerable.
http://www.example.com/iptm/ddv.do?deviceInstanceName=f3806"%3balert(1)//9b92b050cf5&deviceC
apability=deviceCap
http://www.example.com/iptm/ddv.do?deviceInstanceName=25099<script>alert(1)</script>f813ea8c
06d&deviceCapability=deviceCap
Trust: 1.0
EXPLOIT LANGUAGE
txt
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
'iptm/ddv.do?deviceInstanceName' Cross-Site Scripting
Trust: 1.0
TAGS
tag: | exploit | Trust: 0.5 |
tag: | remote | Trust: 0.5 |
tag: | vulnerability | Trust: 0.5 |
tag: | xss | Trust: 0.5 |
tag: | sql injection | Trust: 0.5 |
CREDITS
Sense of Security
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2011-0959 | Trust: 2.4 |
db: | EXPLOIT-DB | id: | 35763 | Trust: 1.9 |
db: | BID | id: | 47901 | Trust: 1.9 |
db: | EDBNET | id: | 57165 | Trust: 0.6 |
db: | NVD | id: | CVE-2011-0961 | Trust: 0.5 |
db: | NVD | id: | CVE-2011-0960 | Trust: 0.5 |
db: | NVD | id: | CVE-2011-0966 | Trust: 0.5 |
db: | NVD | id: | CVE-2011-0962 | Trust: 0.5 |
db: | PACKETSTORM | id: | 101518 | Trust: 0.5 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2011-0959 | Trust: 2.1 |
url: | https://www.securityfocus.com/bid/47901/info | Trust: 1.0 |
url: | https://www.exploit-db.com/exploits/35763/ | Trust: 0.6 |
url: | https://nvd.nist.gov/vuln/detail/cve-2011-0962 | Trust: 0.5 |
url: | https://nvd.nist.gov/vuln/detail/cve-2011-0960 | Trust: 0.5 |
url: | https://nvd.nist.gov/vuln/detail/cve-2011-0961 | Trust: 0.5 |
url: | https://nvd.nist.gov/vuln/detail/cve-2011-0966 | Trust: 0.5 |
url: | https://www.exploit-db.com/exploits/35766 | Trust: 0.3 |
url: | https://www.exploit-db.com/exploits/35764 | Trust: 0.3 |
url: | https://www.exploit-db.com/exploits/35763 | Trust: 0.3 |
url: | https://www.exploit-db.com/exploits/35765 | Trust: 0.3 |
url: | https://www.exploit-db.com/exploits/35762 | Trust: 0.3 |
url: | http://www.cisco.com/en/us/products/ps6535/index.html | Trust: 0.3 |
url: | http://www.senseofsecurity.com.au/advisories/sos-11-006.pdf | Trust: 0.3 |
url: | http://tools.cisco.com/security/center/viewalert.x?alertid=23085 | Trust: 0.3 |
url: | http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0371.html | Trust: 0.3 |
SOURCES
db: | BID | id: | 47901 |
db: | PACKETSTORM | id: | 101518 |
db: | EXPLOIT-DB | id: | 35763 |
db: | EDBNET | id: | 57165 |
LAST UPDATE DATE
2022-07-27T09:19:18.145000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 47901 | date: | 2011-05-18T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 47901 | date: | 2011-05-18T00:00:00 |
db: | PACKETSTORM | id: | 101518 | date: | 2011-05-18T14:17:13 |
db: | EXPLOIT-DB | id: | 35763 | date: | 2011-06-18T00:00:00 |
db: | EDBNET | id: | 57165 | date: | 2011-06-18T00:00:00 |