ID

VAR-201206-0236


CVE

CVE-2012-1825


TITLE

ForeScout CounterACT Cross-site scripting vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2012-002652 // CNNVD: CNNVD-201206-144

DESCRIPTION

Multiple cross-site scripting (XSS) vulnerabilities in the status program on the ForeScout CounterACT appliance with software 6.3.3.2 through 6.3.4.10 allow remote attackers to inject arbitrary web script or HTML via (1) the loginname parameter in a forgotpass action or (2) the username parameter. ForeScout Provided by CounterACT Contains a cross-site scripting vulnerability. ForeScout Provided by CounterACT of Web The interface contains a cross-site scripting vulnerability. Details are provided by the developer ForeScout Security Advisory 12-01 ( Registered users only ) (http://updates.forescout.com/support) Please confirm.An arbitrary script may be executed on the user's web browser. ForeScout CounterACT is an automated security control platform. ForeScout CounterACT 'username' and 'loginname' have cross-site scripting vulnerabilities, since the input passed to the state via the \"username\" and \"loginname\" parameters is not properly filtered before returning to the user, the attacker can exploit the vulnerability in the context of the affected site. Execute arbitrary HTML and script code in the user's browser session. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: ForeScout CounterACT "username" and "loginname" Cross-Site Scripting Vulnerabilities SECUNIA ADVISORY ID: SA49481 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49481/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49481 RELEASE DATE: 2012-06-11 DISCUSS ADVISORY: http://secunia.com/advisories/49481/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49481/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49481 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Two vulnerabilities have been reported in ForeScout CounterACT, which can be exploited by malicious people to conduct cross-site scripting attacks. The vulnerabilities are reported in the following versions: * 6.3.3.2 prior to Hotfix 4.12050. * 6.3.4.0 prior to Hotfix 10.0. * 6.3.4.1 prior to Hotfix 6.0. * 6.3.4.10 prior to Hotfix 1.0. SOLUTION: Apply available hotfixes. Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: US-CERT credits Travis Lee ORIGINAL ADVISORY: US-CERT: http://www.kb.cert.org/vuls/id/815532 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.42

sources: NVD: CVE-2012-1825 // CERT/CC: VU#815532 // JVNDB: JVNDB-2012-002652 // CNVD: CNVD-2012-3126 // BID: 53889 // IVD: c3bed81e-2353-11e6-abef-000c29c66e3d // PACKETSTORM: 113491

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: c3bed81e-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-3126

AFFECTED PRODUCTS

vendor:forescoutmodel:counteractscope:eqversion:6.3.4.10

Trust: 1.9

vendor:forescoutmodel:counteractscope:eqversion:6.3.3.2

Trust: 1.9

vendor:forescoutmodel: - scope: - version: -

Trust: 0.8

vendor:forescoutmodel:counteractscope:ltversion:6.3.3.2 hotfix 4.12050 earlier

Trust: 0.8

vendor:forescoutmodel:counteractscope:ltversion:6.3.4.0 hotfix 10.0 earlier

Trust: 0.8

vendor:forescoutmodel:counteractscope:ltversion:6.3.4.1 hotfix 6.0 earlier

Trust: 0.8

vendor:forescoutmodel:counteractscope:ltversion:6.3.4.10 hotfix 1.0 earlier

Trust: 0.8

vendor:forescoutmodel:counteractscope:eqversion:6.x

Trust: 0.6

vendor:forescoutmodel:counteractscope:eqversion:6.3.4.1

Trust: 0.3

vendor:forescoutmodel:counteractscope:eqversion:6.3.4.0

Trust: 0.3

vendor:forescoutmodel:counteractscope:eqversion:0

Trust: 0.3

vendor:counteractmodel: - scope:eqversion:6.3.3.2

Trust: 0.2

vendor:counteractmodel: - scope:eqversion:6.3.4.10

Trust: 0.2

sources: IVD: c3bed81e-2353-11e6-abef-000c29c66e3d // CERT/CC: VU#815532 // CNVD: CNVD-2012-3126 // BID: 53889 // JVNDB: JVNDB-2012-002652 // CNNVD: CNNVD-201206-144 // NVD: CVE-2012-1825

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2012-1825
value: MEDIUM

Trust: 1.6

nvd@nist.gov: CVE-2012-1825
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-201206-144
value: MEDIUM

Trust: 0.6

IVD: c3bed81e-2353-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2012-1825
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

NVD: CVE-2012-1825
severity: MEDIUM
baseScore: 4.3
vectorString: NONE
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IVD: c3bed81e-2353-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: c3bed81e-2353-11e6-abef-000c29c66e3d // CERT/CC: VU#815532 // JVNDB: JVNDB-2012-002652 // CNNVD: CNNVD-201206-144 // NVD: CVE-2012-1825

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2012-002652 // NVD: CVE-2012-1825

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201206-144

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 113491 // CNNVD: CNNVD-201206-144

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002652

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#815532

PATCH

title:ForeScout Customer Support Portal (登録ユーザのみ)url:http://updates.forescout.com/support

Trust: 0.8

title:ForeScout CounterACT 'username' and 'loginname' cross-site scripting vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/17914

Trust: 0.6

sources: CNVD: CNVD-2012-3126 // JVNDB: JVNDB-2012-002652

EXTERNAL IDS

db:CERT/CCid:VU#815532

Trust: 4.2

db:NVDid:CVE-2012-1825

Trust: 3.5

db:CNVDid:CNVD-2012-3126

Trust: 0.8

db:CNNVDid:CNNVD-201206-144

Trust: 0.8

db:JVNDBid:JVNDB-2012-002652

Trust: 0.8

db:SECUNIAid:49481

Trust: 0.8

db:BIDid:53889

Trust: 0.3

db:IVDid:C3BED81E-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:113491

Trust: 0.1

sources: IVD: c3bed81e-2353-11e6-abef-000c29c66e3d // CERT/CC: VU#815532 // CNVD: CNVD-2012-3126 // BID: 53889 // JVNDB: JVNDB-2012-002652 // PACKETSTORM: 113491 // CNNVD: CNNVD-201206-144 // NVD: CVE-2012-1825

REFERENCES

url:http://www.kb.cert.org/vuls/id/815532

Trust: 2.8

url:http://www.kb.cert.org/vuls/id/mapg-8twmej

Trust: 2.4

url:http://updates.forescout.com/support

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/79.html

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1825

Trust: 0.8

url:http://jvn.jp/cert/jvnvu815532/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1825

Trust: 0.8

url:http://www.kb.cert.org/vuls/id/815532http

Trust: 0.6

url:http://secunia.com/advisories/49481

Trust: 0.6

url:http://www.forescout.com/product/

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/advisories/49481/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=49481

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/49481/#comments

Trust: 0.1

sources: CERT/CC: VU#815532 // CNVD: CNVD-2012-3126 // BID: 53889 // JVNDB: JVNDB-2012-002652 // PACKETSTORM: 113491 // CNNVD: CNNVD-201206-144 // NVD: CVE-2012-1825

CREDITS

Travis Lee

Trust: 0.3

sources: BID: 53889

SOURCES

db:IVDid:c3bed81e-2353-11e6-abef-000c29c66e3d
db:CERT/CCid:VU#815532
db:CNVDid:CNVD-2012-3126
db:BIDid:53889
db:JVNDBid:JVNDB-2012-002652
db:PACKETSTORMid:113491
db:CNNVDid:CNNVD-201206-144
db:NVDid:CVE-2012-1825

LAST UPDATE DATE

2024-11-23T21:55:59.271000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#815532date:2013-05-15T00:00:00
db:CNVDid:CNVD-2012-3126date:2012-06-13T00:00:00
db:BIDid:53889date:2012-06-08T00:00:00
db:JVNDBid:JVNDB-2012-002652date:2012-06-13T00:00:00
db:CNNVDid:CNNVD-201206-144date:2012-06-14T00:00:00
db:NVDid:CVE-2012-1825date:2024-11-21T01:37:51.167

SOURCES RELEASE DATE

db:IVDid:c3bed81e-2353-11e6-abef-000c29c66e3ddate:2012-06-13T00:00:00
db:CERT/CCid:VU#815532date:2012-06-08T00:00:00
db:CNVDid:CNVD-2012-3126date:2012-06-13T00:00:00
db:BIDid:53889date:2012-06-08T00:00:00
db:JVNDBid:JVNDB-2012-002652date:2012-06-11T00:00:00
db:PACKETSTORMid:113491date:2012-06-11T03:15:23
db:CNNVDid:CNNVD-201206-144date:2012-06-12T00:00:00
db:NVDid:CVE-2012-1825date:2012-06-11T23:55:00.970