ID

VAR-200701-0392


CVE

CVE-2007-0514


TITLE

Multiple Vulnerabilities Concerning Hitachi Web Server

Trust: 0.8

sources: JVNDB: JVNDB-2006-000992

DESCRIPTION

Multiple cross-site scripting (XSS) vulnerabilities in multiple Hitachi Web Server, uCosminexus, and Cosminexus products before 20070124 allow remote attackers to inject arbitrary web script or HTML via (1) HTTP Expect headers or (2) image maps. Hitachi Web Server has vulnerabilities listed below: 1. A vulnerability that allows to roll back the Open SSL version when using the SSL. 2. 3. Cross-site scripting vulnerability due to inadequate processing of the Expect header.1. When using the SSL, there is the possibility an attacker could deceptively alter the protocol, forcing the use of SSL version 2. 2. and 3. An attacker could insert malicious script. ** Delete ** This case CVE-2005-2969 , CVE-2005-3352 , CVE-2006-3918 Contents of ( Both are Hitachi vendor information HS06-022) And was removed because it was found to be a duplicate. CVE-2005-2969 , CVE-2005-3352 , CVE-2006-3918 Please refer to. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user or to bypass certain security restrictions. This may help the attacker steal cookie-based authentication credentials and launch other attacks. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. 1) Input passed to certain parameters in various files in Hitachi Web Server is not properly sanitised before being returned to the user. 2) Input passed via the "Expect" header in Hitachi Web Server is not properly sanitised before being returned to the user. 3) An error in the way Hitachi Web Server handles SSL 3.0 or TLS 1.0 protocols can be exploited by attackers to replace the connection with a connection using SSL 2.0 protocol. See the vendor advisory for a matrix of affected versions. SOLUTION: Updates are available for some versions (please see vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.97

sources: NVD: CVE-2007-0514 // JVNDB: JVNDB-2006-000992 // JVNDB: JVNDB-2007-003272 // BID: 22234 // BID: 81987 // PACKETSTORM: 53943

AFFECTED PRODUCTS

vendor:hitachimodel:cosminexus server - web editionscope: - version: -

Trust: 1.4

vendor:hitachimodel:cosminexus server - web edition version 4scope: - version: -

Trust: 1.4

vendor:hitachimodel:web serverscope: - version: -

Trust: 1.4

vendor:hitachimodel:ucosminexus application server smart editionscope: - version: -

Trust: 1.4

vendor:hitachimodel:ucosminexus application server standardscope: - version: -

Trust: 1.4

vendor:hitachimodel:ucosminexus developer lightscope: - version: -

Trust: 1.4

vendor:hitachimodel:ucosminexus developer standardscope: - version: -

Trust: 1.4

vendor:hitachimodel:ucosminexus service architectscope: - version: -

Trust: 1.4

vendor:hitachimodel:ucosminexus service platformscope: - version: -

Trust: 1.4

vendor:hitachimodel:web serverscope:neversion:03-00-01

Trust: 1.2

vendor:hitachimodel:web server 02-04-/bscope:neversion: -

Trust: 1.2

vendor:hitachimodel:ucosminexus service platformscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:ucosminexus service architectscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:cosminexus developer light version 6scope:eqversion:*

Trust: 1.0

vendor:hitachimodel:cosminexus developer professional version 6scope:eqversion:*

Trust: 1.0

vendor:hitachimodel:cosminexus application serverscope:eqversion:6

Trust: 1.0

vendor:hitachimodel:cosminexus developer standard version 6scope:eqversion:*

Trust: 1.0

vendor:hitachimodel:cosminexus server - web editionscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:cosminexus application server version 5scope:eqversion:*

Trust: 1.0

vendor:hitachimodel:cosminexus developer version 5scope:eqversion:*

Trust: 1.0

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:ucosminexus application server smart editionscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:cosminexus server - standard edition version 4scope:eqversion:*

Trust: 1.0

vendor:hitachimodel:cosminexus server - web edition version 4scope:eqversion:*

Trust: 1.0

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:*

Trust: 1.0

vendor:hitachimodel:cosminexus server - standard editionscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:ucosminexus developer lightscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:cosminexus server - enterprise editionscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:web serverscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:cosminexus application serverscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:cosminexus application server standardscope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:cosminexus application server version 5scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer light version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer professional version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer standard version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer version 5scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus server - enterprise editionscope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus server - standard editionscope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus server - standard edition version 4scope: - version: -

Trust: 0.8

vendor:hitachimodel:web serverscope:eqversion:- custom edition

Trust: 0.8

vendor:hitachimodel:web serverscope:eqversion:- security enhancement

Trust: 0.8

vendor:hitachimodel:web serverscope:eqversion:for vos3

Trust: 0.8

vendor:hitachimodel:ucosminexus application server enterprisescope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:professional

Trust: 0.8

vendor:hitachimodel:cosminexus application serverscope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:cosminexus application server version 5scope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:cosminexus developer light version 6scope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:cosminexus developer professional version 6scope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:cosminexus developer standard version 6scope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:cosminexus developer version 5scope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:cosminexus server - enterprise editionscope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:cosminexus server - standard editionscope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:cosminexus server - standard edition version 4scope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:cosminexus server - web editionscope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:cosminexus server - web edition version 4scope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:web serverscope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:ucosminexus application server enterprisescope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:ucosminexus application server smart editionscope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:ucosminexus application server standardscope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:ucosminexus developer lightscope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:ucosminexus developer standardscope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:ucosminexus service architectscope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:ucosminexus service platformscope:ltversion:20070124

Trust: 0.8

vendor:hitachimodel:web serverscope:eqversion:0

Trust: 0.6

vendor:hitachimodel:ucosminexus service platformscope:eqversion:0

Trust: 0.6

vendor:hitachimodel:ucosminexus service architectscope:eqversion:0

Trust: 0.6

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:0

Trust: 0.6

vendor:hitachimodel:ucosminexus developer lightscope:eqversion:0

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:0

Trust: 0.6

vendor:hitachimodel:ucosminexus application server smart editionscope:eqversion:0

Trust: 0.6

vendor:hitachimodel:cosminexus server enterprise editionscope:eqversion:-0

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:6

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:enterprise

Trust: 0.6

vendor:hitachimodel:web server for vos3scope:eqversion:0

Trust: 0.3

vendor:hitachimodel:web server security enhancementscope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:web server custom editionscope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise )scope:eqversion:09-80

Trust: 0.3

vendor:hitachimodel:cosminexus server web editionscope:eqversion:4

Trust: 0.3

vendor:hitachimodel:cosminexus server web editionscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:cosminexus server standard editionscope:eqversion:4

Trust: 0.3

vendor:hitachimodel:cosminexus server standard editionscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:cosminexus developer standardscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:cosminexus developer professionalscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:cosminexus developerscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:cosminexus application server standardscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:cosminexus application serverscope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:web server 02-06-/ascope:neversion: -

Trust: 0.3

vendor:hitachimodel:web server 02-04-/a (windows ipscope:neversion: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterpris enterprisescope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus server web edition versionscope:eqversion:-40

Trust: 0.3

vendor:hitachimodel:cosminexus server web editionscope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:cosminexus server standard edition versionscope:eqversion:-40

Trust: 0.3

vendor:hitachimodel:cosminexus server standard editionscope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:cosminexus developer versionscope:eqversion:50

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard versionscope:eqversion:60

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional versionscope:eqversion:60

Trust: 0.3

vendor:hitachimodel:cosminexus developer light versionscope:eqversion:60

Trust: 0.3

vendor:hitachimodel:cosminexus application server versionscope:eqversion:50

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:0

Trust: 0.3

sources: BID: 22234 // BID: 81987 // JVNDB: JVNDB-2006-000992 // JVNDB: JVNDB-2007-003272 // CNNVD: CNNVD-200701-449 // NVD: CVE-2007-0514

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0514
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2006-000992
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200701-449
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2007-0514
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2006-000992
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: JVNDB: JVNDB-2006-000992 // CNNVD: CNNVD-200701-449 // NVD: CVE-2007-0514

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-79

Trust: 0.8

problemtype:CWE-noinfo

Trust: 0.8

sources: JVNDB: JVNDB-2006-000992 // NVD: CVE-2007-0514

THREAT TYPE

network

Trust: 0.6

sources: BID: 22234 // BID: 81987

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 53943 // CNNVD: CNNVD-200701-449

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-000992

PATCH

title:HS06-022url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS06-022/index.html

Trust: 1.6

sources: JVNDB: JVNDB-2006-000992 // JVNDB: JVNDB-2007-003272

EXTERNAL IDS

db:NVDid:CVE-2007-0514

Trust: 3.5

db:HITACHIid:HS06-022

Trust: 2.3

db:SECUNIAid:23843

Trust: 1.8

db:JVNDBid:JVNDB-2006-000992

Trust: 1.6

db:VUPENid:ADV-2007-0326

Trust: 1.6

db:OSVDBid:32997

Trust: 1.6

db:OSVDBid:32998

Trust: 1.6

db:JVNDBid:JVNDB-2007-003272

Trust: 0.8

db:CNNVDid:CNNVD-200701-449

Trust: 0.6

db:BIDid:22234

Trust: 0.3

db:BIDid:81987

Trust: 0.3

db:PACKETSTORMid:53943

Trust: 0.1

sources: BID: 22234 // BID: 81987 // JVNDB: JVNDB-2006-000992 // JVNDB: JVNDB-2007-003272 // PACKETSTORM: 53943 // CNNVD: CNNVD-200701-449 // NVD: CVE-2007-0514

REFERENCES

url:http://www.hitachi-support.com/security_e/vuls_e/hs06-022_e/01-e.html

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0514

Trust: 1.6

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0514

Trust: 1.6

url:http://osvdb.org/32998

Trust: 1.6

url:http://osvdb.org/32997

Trust: 1.6

url:http://secunia.com/advisories/23843

Trust: 1.6

url:http://www.vupen.com/english/advisories/2007/0326

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-2969

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-3352

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3918

Trust: 0.8

url:http://jvndb.jvn.jp/ja/contents/2006/jvndb-2006-000992.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-3918

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2005-2969

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2005-3352

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/0326

Trust: 0.6

url:http://www.hitachi.com/

Trust: 0.3

url:http://secunia.com/product/13338/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/23843/

Trust: 0.1

url:http://secunia.com/product/13335/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://secunia.com/product/13337/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/13333/

Trust: 0.1

url:http://secunia.com/product/13336/

Trust: 0.1

url:http://secunia.com/product/13334/

Trust: 0.1

sources: BID: 22234 // BID: 81987 // JVNDB: JVNDB-2006-000992 // JVNDB: JVNDB-2007-003272 // PACKETSTORM: 53943 // CNNVD: CNNVD-200701-449 // NVD: CVE-2007-0514

CREDITS

The vendor disclosed these issues.

Trust: 0.3

sources: BID: 22234

SOURCES

db:BIDid:22234
db:BIDid:81987
db:JVNDBid:JVNDB-2006-000992
db:JVNDBid:JVNDB-2007-003272
db:PACKETSTORMid:53943
db:CNNVDid:CNNVD-200701-449
db:NVDid:CVE-2007-0514

LAST UPDATE DATE

2024-08-14T12:35:07.329000+00:00


SOURCES UPDATE DATE

db:BIDid:22234date:2008-12-18T14:11:00
db:BIDid:81987date:2007-01-25T00:00:00
db:JVNDBid:JVNDB-2006-000992date:2014-05-22T00:00:00
db:JVNDBid:JVNDB-2007-003272date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200701-449date:2007-01-26T00:00:00
db:NVDid:CVE-2007-0514date:2011-03-08T02:49:59.453

SOURCES RELEASE DATE

db:BIDid:22234date:2007-01-25T00:00:00
db:BIDid:81987date:2007-01-25T00:00:00
db:JVNDBid:JVNDB-2006-000992date:2009-02-04T00:00:00
db:JVNDBid:JVNDB-2007-003272date:2012-09-25T00:00:00
db:PACKETSTORMid:53943date:2007-01-27T01:46:45
db:CNNVDid:CNNVD-200701-449date:2007-01-25T00:00:00
db:NVDid:CVE-2007-0514date:2007-01-26T00:28:00