ID

VAR-201107-0258


CVE

CVE-2011-2958


TITLE

Ecava IntegraXor Multiple Cross-Site Scripting Vulnerabilities

Trust: 1.2

sources: CNNVD: CNNVD-201108-064 // CNNVD: CNNVD-201107-434

DESCRIPTION

Multiple cross-site scripting (XSS) vulnerabilities in Ecava IntegraXor before 3.60 (Build 4080) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. Ecava IntegraXor is a human interface product that uses HTML and SVG. A cross-site scripting vulnerability exists in Ecava IntegraXor. Because the application lacks filtering of user-submitted data, an attacker exploits a vulnerability to steal cookie-based authentication credentials and execute arbitrary code in an uninformed user's browser in the context of the affected site. Ecava IntegraXor is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Ecava IntegraXor versions prior to 3.60.4080 are vulnerable. ---------------------------------------------------------------------- The Secunia Vulnerability Intelligence Manager (VIM) enables you to handle vulnerability threats in a simple, cost effective way. Read more and request a free trial: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: IntegraXor Unspecified Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA44321 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44321/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44321 RELEASE DATE: 2011-08-03 DISCUSS ADVISORY: http://secunia.com/advisories/44321/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/44321/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=44321 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in IntegraXor, which can be exploited by malicious people to conduct cross-site scripting attacks. Certain unspecified input is not properly sanitised before being returned to the user. SOLUTION: Update to version 3.60 Build 4080. PROVIDED AND/OR DISCOVERED BY: An anonymous researcher via ICS CERT. ORIGINAL ADVISORY: IntegraXor: http://www.integraxor.com/blog/security-issue-xss-vulnerability-note ICS CERT (ICSA-11-147-02): http://www.us-cert.gov/control_systems/pdf/ICSA-11-147-02.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.15

sources: NVD: CVE-2011-2958 // JVNDB: JVNDB-2011-003487 // CNVD: CNVD-2011-2970 // BID: 73788 // BID: 48958 // IVD: c2a1aa96-2354-11e6-abef-000c29c66e3d // IVD: 01ac8dc0-1f8e-11e6-abef-000c29c66e3d // PACKETSTORM: 103691

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: c2a1aa96-2354-11e6-abef-000c29c66e3d // IVD: 01ac8dc0-1f8e-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-2970

AFFECTED PRODUCTS

vendor:ecavamodel:integraxorscope:eqversion:3.60

Trust: 2.2

vendor:ecavamodel:integraxorscope:eqversion:3.6.4000.0

Trust: 2.2

vendor:ecavamodel:integraxorscope:eqversion:3.5.3900.5

Trust: 1.9

vendor:ecavamodel:integraxorscope:eqversion:3.5.3900.10

Trust: 1.9

vendor:ecavamodel:integraxorscope:lteversion:3.60.4061

Trust: 1.0

vendor:ecavamodel:integraxorscope:eqversion:3.60.4061

Trust: 0.9

vendor:ecavamodel:integraxorscope:eqversion:3.x

Trust: 0.8

vendor:ecavamodel:integraxorscope:ltversion:3.60 (build 4080)

Trust: 0.8

vendor:ecavamodel:integraxorscope:eqversion:3.60.4050

Trust: 0.3

vendor:ecavamodel:integraxorscope:eqversion:3.60.4032

Trust: 0.3

vendor:ecavamodel:integraxorscope:eqversion:3.6.4000.5

Trust: 0.3

vendor:ecavamodel:integraxorscope:eqversion:3.5.4000.5

Trust: 0.3

vendor:ecavamodel:integraxorscope:eqversion:3.5

Trust: 0.3

vendor:ecavamodel:integraxorscope:neversion:3.60.4080

Trust: 0.3

vendor:integraxormodel: - scope:eqversion:3.5.3900.5

Trust: 0.2

vendor:integraxormodel: - scope:eqversion:3.5.3900.10

Trust: 0.2

vendor:integraxormodel: - scope:eqversion:3.6.4000.0

Trust: 0.2

vendor:integraxormodel: - scope:eqversion:3.60

Trust: 0.2

vendor:integraxormodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: c2a1aa96-2354-11e6-abef-000c29c66e3d // IVD: 01ac8dc0-1f8e-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-2970 // BID: 73788 // BID: 48958 // JVNDB: JVNDB-2011-003487 // CNNVD: CNNVD-201107-434 // NVD: CVE-2011-2958

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-2958
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-2958
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201107-434
value: MEDIUM

Trust: 0.6

IVD: c2a1aa96-2354-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: 01ac8dc0-1f8e-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2011-2958
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: c2a1aa96-2354-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 01ac8dc0-1f8e-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0 [IVD]

Trust: 0.2

sources: IVD: c2a1aa96-2354-11e6-abef-000c29c66e3d // IVD: 01ac8dc0-1f8e-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2011-003487 // CNNVD: CNNVD-201107-434 // NVD: CVE-2011-2958

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2011-003487 // NVD: CVE-2011-2958

THREAT TYPE

remote

Trust: 1.2

sources: CNNVD: CNNVD-201108-064 // CNNVD: CNNVD-201107-434

TYPE

xss

Trust: 1.3

sources: PACKETSTORM: 103691 // CNNVD: CNNVD-201108-064 // CNNVD: CNNVD-201107-434

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-003487

PATCH

title:Security Issue XSS Vulnerability Noteurl:http://www.integraxor.com/blog/security-issue-xss-vulnerability-note

Trust: 0.8

title:Patch for Ecava IntegraXor Cross-Site Scripting Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/4603

Trust: 0.6

sources: CNVD: CNVD-2011-2970 // JVNDB: JVNDB-2011-003487

EXTERNAL IDS

db:ICS CERTid:ICSA-11-147-02

Trust: 3.1

db:NVDid:CVE-2011-2958

Trust: 2.9

db:BIDid:48958

Trust: 1.5

db:CNNVDid:CNNVD-201107-434

Trust: 0.8

db:CNVDid:CNVD-2011-2970

Trust: 0.8

db:JVNDBid:JVNDB-2011-003487

Trust: 0.8

db:CNNVDid:CNNVD-201108-064

Trust: 0.6

db:XFid:68896

Trust: 0.3

db:BIDid:73788

Trust: 0.3

db:IVDid:C2A1AA96-2354-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:01AC8DC0-1F8E-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:SECUNIAid:44321

Trust: 0.2

db:PACKETSTORMid:103691

Trust: 0.1

sources: IVD: c2a1aa96-2354-11e6-abef-000c29c66e3d // IVD: 01ac8dc0-1f8e-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-2970 // BID: 73788 // BID: 48958 // JVNDB: JVNDB-2011-003487 // PACKETSTORM: 103691 // CNNVD: CNNVD-201108-064 // CNNVD: CNNVD-201107-434 // NVD: CVE-2011-2958

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-11-147-02.pdf

Trust: 3.1

url:http://www.integraxor.com/blog/security-issue-xss-vulnerability-note

Trust: 2.3

url:http://www.securityfocus.com/bid/48958

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/68896

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2958

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2958

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/68896

Trust: 0.3

url:http://www.ecava.com/index.htm

Trust: 0.3

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/44321/#comments

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/44321/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=44321

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2011-2970 // BID: 73788 // BID: 48958 // JVNDB: JVNDB-2011-003487 // PACKETSTORM: 103691 // CNNVD: CNNVD-201108-064 // CNNVD: CNNVD-201107-434 // NVD: CVE-2011-2958

CREDITS

Unknown

Trust: 0.3

sources: BID: 73788

SOURCES

db:IVDid:c2a1aa96-2354-11e6-abef-000c29c66e3d
db:IVDid:01ac8dc0-1f8e-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2011-2970
db:BIDid:73788
db:BIDid:48958
db:JVNDBid:JVNDB-2011-003487
db:PACKETSTORMid:103691
db:CNNVDid:CNNVD-201108-064
db:CNNVDid:CNNVD-201107-434
db:NVDid:CVE-2011-2958

LAST UPDATE DATE

2024-08-14T14:47:07.650000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-2970date:2011-08-03T00:00:00
db:BIDid:73788date:2011-07-28T00:00:00
db:BIDid:48958date:2011-08-02T00:00:00
db:JVNDBid:JVNDB-2011-003487date:2011-12-22T00:00:00
db:CNNVDid:CNNVD-201108-064date:2011-08-04T00:00:00
db:CNNVDid:CNNVD-201107-434date:2011-07-29T00:00:00
db:NVDid:CVE-2011-2958date:2017-08-29T01:29:53.287

SOURCES RELEASE DATE

db:IVDid:c2a1aa96-2354-11e6-abef-000c29c66e3ddate:2011-07-29T00:00:00
db:IVDid:01ac8dc0-1f8e-11e6-abef-000c29c66e3ddate:2011-08-03T00:00:00
db:CNVDid:CNVD-2011-2970date:2011-08-03T00:00:00
db:BIDid:73788date:2011-07-28T00:00:00
db:BIDid:48958date:2011-08-02T00:00:00
db:JVNDBid:JVNDB-2011-003487date:2011-12-22T00:00:00
db:PACKETSTORMid:103691date:2011-08-03T03:38:13
db:CNNVDid:CNNVD-201108-064date:1900-01-01T00:00:00
db:CNNVDid:CNNVD-201107-434date:2011-07-29T00:00:00
db:NVDid:CVE-2011-2958date:2011-07-28T18:55:04.237