ID

VAR-201004-1001


CVE

CVE-2010-0817


TITLE

Microsoft SharePoint Server Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2010-001463

DESCRIPTION

Cross-site scripting (XSS) vulnerability in _layouts/help.aspx in Microsoft SharePoint Server 2007 12.0.0.6421 and possibly earlier, and SharePoint Services 3.0 SP1 and SP2, versions, allows remote attackers to inject arbitrary web script or HTML via the cid0 parameter. Microsoft SharePoint Server is a server feature integration suite that provides comprehensive content management and enterprise search, accelerates shared business processes, and facilitates cross-border information sharing. The \"/_layouts/help.aspx\" script does not properly filter the input submitted by the user to the \"cid0\" variable. Successful exploitation of the vulnerability can steal COOKIE information such as for authentication, or obtain or modify sensitive data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA10-159B Microsoft Updates for Multiple Vulnerabilities Original release date: June 08, 2010 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Internet Explorer * Microsoft Office * Microsoft SharePoint Services * Microsoft .NET Framework Overview Microsoft has released updates to address vulnerabilities in Microsoft Windows, Microsoft Internet Explorer, Microsoft Office, Microsoft SharePoint Services, and Microsoft .NET Framework. I. Description The Microsoft Security Bulletin Summary for June 2010 describes vulnerabilities in Microsoft Windows, Internet Explorer, Office, SharePoint Services, and .NET Framework. Microsoft has released updates to address the vulnerabilities. II. III. Solution Apply updates Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for June 2010. The security bulletin describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. Administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). IV. References * Microsoft Security Bulletin Summary for June 2010 - <http://www.microsoft.com/technet/security/bulletin/ms10-jun.mspx> * Microsoft Windows Server Update Services - <http://technet.microsoft.com/en-us/wsus/default.aspx> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA10-159B.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA10-159B Feedback VU#855166" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2010 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History June 08, 2010: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBTA6Wzj6pPKYJORa3AQLl4Qf/dTsaW53BBruyFOcypbooTw5ULG9E5wPa /DEiksCuX8hYOoev9jDDyhXZQIaE2OrkWdLpJJBtXwJJ4XhBqyni3fhQFrIkwGVQ 3w3068TGE6v/sjV/W/qWmkZjl4r+FIcR9VRlulLet9ZZAxoJ7VgTg/1O8eixr7SO HpO+Xb3l3d4/XUGtTKCu5DsTTD1l6qQr66m3l4o26Bj834qfh0fvfneZHXCy3PUH /lE3nFxH3M+JOQEdapgc/aYVnrcroZKix61lfs2S1NIUxvBAxea0UFZtywIId0hK Sh2LGp7tUlXpfk8oo8LMgKG1y25xYmLE5WYIhO4E6Mas3jT/9ArwHQ== =mq6Z -----END PGP SIGNATURE-----

Trust: 2.52

sources: NVD: CVE-2010-0817 // JVNDB: JVNDB-2010-001463 // CNVD: CNVD-2010-0744 // BID: 39776 // PACKETSTORM: 90440

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-0744

AFFECTED PRODUCTS

vendor:microsoftmodel:sharepoint servicesscope:eqversion:3.0

Trust: 1.6

vendor:microsoftmodel:sharepoint serverscope:eqversion:2007

Trust: 1.6

vendor:microsoftmodel:sharepoint serverscope:eqversion:200712.0.0.6318

Trust: 0.9

vendor:microsoftmodel:sharepoint serverscope:eqversion:200712.0.0.6421

Trust: 0.9

vendor:microsoftmodel:sharepoint server sp1scope:eqversion:2007

Trust: 0.9

vendor:microsoftmodel:sharepoint server sp2scope:eqversion:2007

Trust: 0.9

vendor:microsoftmodel:sharepoint serverscope:eqversion:2007x640

Trust: 0.9

vendor:microsoftmodel:sharepoint server sp1scope:eqversion:2007x64

Trust: 0.9

vendor:microsoftmodel:sharepoint server sp2scope:eqversion:2007x64

Trust: 0.9

vendor:microsoftmodel:office sharepoint serverscope:eqversion:2007 (32 bit version )

Trust: 0.8

vendor:microsoftmodel:office sharepoint serverscope:eqversion:2007 (64 bit version )

Trust: 0.8

vendor:microsoftmodel:windows sharepoint servicesscope:eqversion:3.0 (32 bit version )

Trust: 0.8

vendor:microsoftmodel:windows sharepoint servicesscope:eqversion:3.0 (64 bit version )

Trust: 0.8

vendor:microsoftmodel:windows sharepoint servicesscope:eqversion:3.0

Trust: 0.3

vendor:microsoftmodel:sharepoint services 64-bit sp2scope:eqversion:3.0

Trust: 0.3

vendor:microsoftmodel:sharepoint services 64-bit sp1scope:eqversion:3.0

Trust: 0.3

vendor:microsoftmodel:sharepoint services 64-bitscope:eqversion:3.0

Trust: 0.3

vendor:microsoftmodel:sharepoint services sp2scope:eqversion:3.0

Trust: 0.3

vendor:microsoftmodel:sharepoint services sp1scope:eqversion:3.0

Trust: 0.3

vendor:microsoftmodel:sharepoint serverscope:eqversion:20070

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:1.1

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:5

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:4

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:0

Trust: 0.3

vendor:avayamodel:meeting exchange webportalscope:eqversion:-6.0

Trust: 0.3

vendor:avayamodel:meeting exchange web conferencing serverscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:meeting exchange streaming serverscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:meeting exchange recording serverscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:meeting exchange client registration serverscope:eqversion:-0

Trust: 0.3

sources: CNVD: CNVD-2010-0744 // BID: 39776 // JVNDB: JVNDB-2010-001463 // CNNVD: CNNVD-201004-484 // NVD: CVE-2010-0817

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0817
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-0817
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201004-484
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2010-0817
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2010-001463 // CNNVD: CNNVD-201004-484 // NVD: CVE-2010-0817

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2010-001463 // NVD: CVE-2010-0817

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201004-484

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201004-484

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001463

PATCH

title:983438url:http://www.microsoft.com/technet/security/advisory/983438.mspx

Trust: 0.8

title:MS10-039url:http://www.microsoft.com/technet/security/bulletin/MS10-039.mspx

Trust: 0.8

title:983438url:http://www.microsoft.com/japan/technet/security/advisory/983438.mspx

Trust: 0.8

title:MS10-039url:http://www.microsoft.com/japan/technet/security/bulletin/ms10-039.mspx

Trust: 0.8

title:MS10-039eurl:http://www.microsoft.com/japan/security/bulletins/MS10-039e.mspx

Trust: 0.8

title:TA10-159Burl:http://software.fujitsu.com/jp/security/vulnerabilities/ta10-159b.html

Trust: 0.8

sources: JVNDB: JVNDB-2010-001463

EXTERNAL IDS

db:NVDid:CVE-2010-0817

Trust: 2.7

db:USCERTid:TA10-159B

Trust: 1.9

db:BIDid:39776

Trust: 0.9

db:USCERTid:SA10-159B

Trust: 0.8

db:JVNDBid:JVNDB-2010-001463

Trust: 0.8

db:CNVDid:CNVD-2010-0744

Trust: 0.6

db:BUGTRAQid:20100428 XSS IN MICROSOFT SHAREPOINT SERVER 2007

Trust: 0.6

db:NSFOCUSid:14916

Trust: 0.6

db:CNNVDid:CNNVD-201004-484

Trust: 0.6

db:PACKETSTORMid:90440

Trust: 0.1

sources: CNVD: CNVD-2010-0744 // BID: 39776 // JVNDB: JVNDB-2010-001463 // PACKETSTORM: 90440 // CNNVD: CNNVD-201004-484 // NVD: CVE-2010-0817

REFERENCES

url:http://www.htbridge.ch/advisory/xss_in_microsoft_sharepoint_server_2007.html

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta10-159b.html

Trust: 1.8

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-039

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7468

Trust: 1.0

url:http://www.securityfocus.com/archive/1/511021/100/0/threaded

Trust: 1.0

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0817

Trust: 0.8

url:http://www.jpcert.or.jp/at/2010/at100014.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta10-159b/index.html

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2010-18/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0817

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa10-159b.html

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/#topics

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/511021/100/0/threaded

Trust: 0.6

url:http://www.nsfocus.net/vulndb/14916

Trust: 0.6

url:https://products.office.com/en-us/sharepoint/collaboration

Trust: 0.3

url:http://blogs.technet.com/msrc/archive/2010/04/29/security-advisory-983438-released.aspx

Trust: 0.3

url:/archive/1/511021

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100089744

Trust: 0.3

url:http://www.microsoft.com/technet/security/advisory/983438.mspx

Trust: 0.3

url:http://www.microsoft.com/technet/security/bulletin/ms10-039.mspx

Trust: 0.3

url:http://www.us-cert.gov/cas/techalerts/ta10-159b.html>

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms10-jun.mspx>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://technet.microsoft.com/en-us/wsus/default.aspx>

Trust: 0.1

sources: CNVD: CNVD-2010-0744 // BID: 39776 // JVNDB: JVNDB-2010-001463 // PACKETSTORM: 90440 // CNNVD: CNNVD-201004-484 // NVD: CVE-2010-0817

CREDITS

High-Tech Bridge SA http://www.htbridge.ch/

Trust: 0.6

sources: CNNVD: CNNVD-201004-484

SOURCES

db:CNVDid:CNVD-2010-0744
db:BIDid:39776
db:JVNDBid:JVNDB-2010-001463
db:PACKETSTORMid:90440
db:CNNVDid:CNNVD-201004-484
db:NVDid:CVE-2010-0817

LAST UPDATE DATE

2024-11-23T19:43:19.768000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2010-0744date:2010-04-30T00:00:00
db:BIDid:39776date:2010-06-10T19:09:00
db:JVNDBid:JVNDB-2010-001463date:2010-07-01T00:00:00
db:CNNVDid:CNNVD-201004-484date:2010-04-30T00:00:00
db:NVDid:CVE-2010-0817date:2024-11-21T01:13:01.200

SOURCES RELEASE DATE

db:CNVDid:CNVD-2010-0744date:2010-04-30T00:00:00
db:BIDid:39776date:2010-04-28T00:00:00
db:JVNDBid:JVNDB-2010-001463date:2010-05-26T00:00:00
db:PACKETSTORMid:90440date:2010-06-09T01:41:01
db:CNNVDid:CNNVD-201004-484date:2010-04-29T00:00:00
db:NVDid:CVE-2010-0817date:2010-04-29T21:30:00.370