ID

VAR-201709-0829


CVE

CVE-2017-14651


TITLE

WSO2 Data Analytics Server Cross-Site Scripting Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2017-35425 // CNNVD: CNNVD-201709-992

DESCRIPTION

WSO2 Data Analytics Server 3.1.0 has XSS in carbon/resources/add_collection_ajaxprocessor.jsp via the collectionName or parentPath parameter. WSO2DataAnalyticsServer is a data analysis server of WSO2 Corporation of the United States, which provides real-time analysis of data streams, complex event processing and machine learning. A cross-site scripting vulnerability exists in the carbon/resources/add_collection_ajaxprocessor.jsp file in WSO2DataAnalyticsServer version 3.1.0. A remote attacker can use this vulnerability to hijack a user's session with the help of the \342\200\230collectionName\342\200\231 or \342\200\230parentPath\342\200\231 parameter, and change the login user password, causing the user session to fail

Trust: 2.25

sources: NVD: CVE-2017-14651 // JVNDB: JVNDB-2017-008295 // CNVD: CNVD-2017-35425 // VULMON: CVE-2017-14651

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-35425

AFFECTED PRODUCTS

vendor:wso2model:data analytics serverscope:eqversion:3.1.0

Trust: 3.0

vendor:wso2model:api managerscope:eqversion:2.1.0

Trust: 2.4

vendor:wso2model:app managerscope:eqversion:1.2.0

Trust: 2.4

vendor:wso2model:application serverscope:eqversion:5.3.0

Trust: 2.4

vendor:wso2model:business process serverscope:eqversion:3.6.0

Trust: 2.4

vendor:wso2model:business rules serverscope:eqversion:2.2.0

Trust: 2.4

vendor:wso2model:complex event processorscope:eqversion:4.2.0

Trust: 2.4

vendor:wso2model:dashboard serverscope:eqversion:2.0.0

Trust: 2.4

vendor:wso2model:data services serverscope:eqversion:3.5.1

Trust: 2.4

vendor:wso2model:enterprise integratorscope:eqversion:6.1.1

Trust: 2.4

vendor:wso2model:enterprise mobility managerscope:eqversion:2.2.0

Trust: 1.8

vendor:wso2model:governance registryscope:eqversion:5.4.0

Trust: 1.8

vendor:wso2model:identity serverscope:eqversion:5.3.0

Trust: 1.8

vendor:wso2model:iot serverscope:eqversion:3.0.0

Trust: 1.8

vendor:wso2model:machine learnerscope:eqversion:1.2.0

Trust: 1.8

vendor:wso2model:message brokerscope:eqversion:3.2.0

Trust: 1.8

vendor:wso2model:storage serverscope:eqversion:1.5.0

Trust: 1.8

sources: CNVD: CNVD-2017-35425 // JVNDB: JVNDB-2017-008295 // CNNVD: CNNVD-201709-992 // NVD: CVE-2017-14651

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-14651
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-14651
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2017-35425
value: LOW

Trust: 0.6

CNNVD: CNNVD-201709-992
value: MEDIUM

Trust: 0.6

VULMON: CVE-2017-14651
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2017-14651
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2017-35425
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2017-14651
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 1.7
impactScore: 2.7
version: 3.1

Trust: 1.0

NVD: CVE-2017-14651
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2017-35425 // VULMON: CVE-2017-14651 // JVNDB: JVNDB-2017-008295 // CNNVD: CNNVD-201709-992 // NVD: CVE-2017-14651

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2017-008295 // NVD: CVE-2017-14651

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201709-992

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201709-992

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-008295

PATCH

title:WSO2-2017-0265url:https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2017-0265

Trust: 0.8

title:Patch for WSO2DataAnalyticsServer Cross-Site Scripting Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/106811

Trust: 0.6

title:WSO2 Data Analytics Server Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75020

Trust: 0.6

title:Kenzer Templates [5170] [DEPRECATED]url:https://github.com/ARPSyndicate/kenzer-templates

Trust: 0.1

sources: CNVD: CNVD-2017-35425 // VULMON: CVE-2017-14651 // JVNDB: JVNDB-2017-008295 // CNNVD: CNNVD-201709-992

EXTERNAL IDS

db:NVDid:CVE-2017-14651

Trust: 3.1

db:JVNDBid:JVNDB-2017-008295

Trust: 0.8

db:CNVDid:CNVD-2017-35425

Trust: 0.6

db:CNNVDid:CNNVD-201709-992

Trust: 0.6

db:VULMONid:CVE-2017-14651

Trust: 0.1

sources: CNVD: CNVD-2017-35425 // VULMON: CVE-2017-14651 // JVNDB: JVNDB-2017-008295 // CNNVD: CNNVD-201709-992 // NVD: CVE-2017-14651

REFERENCES

url:https://github.com/cybersecurityworks/disclosed/issues/15

Trust: 3.1

url:https://docs.wso2.com/display/security/security+advisory+wso2-2017-0265

Trust: 1.7

url:https://cybersecurityworks.com/zerodays/cve-2017-14651-wso2.html

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2017-14651

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14651

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/arpsyndicate/kenzer-templates

Trust: 0.1

sources: CNVD: CNVD-2017-35425 // VULMON: CVE-2017-14651 // JVNDB: JVNDB-2017-008295 // CNNVD: CNNVD-201709-992 // NVD: CVE-2017-14651

SOURCES

db:CNVDid:CNVD-2017-35425
db:VULMONid:CVE-2017-14651
db:JVNDBid:JVNDB-2017-008295
db:CNNVDid:CNNVD-201709-992
db:NVDid:CVE-2017-14651

LAST UPDATE DATE

2024-11-23T23:05:19.018000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-35425date:2017-11-29T00:00:00
db:VULMONid:CVE-2017-14651date:2020-11-09T00:00:00
db:JVNDBid:JVNDB-2017-008295date:2017-10-13T00:00:00
db:CNNVDid:CNNVD-201709-992date:2020-10-30T00:00:00
db:NVDid:CVE-2017-14651date:2024-11-21T03:13:17.600

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-35425date:2017-11-29T00:00:00
db:VULMONid:CVE-2017-14651date:2017-09-21T00:00:00
db:JVNDBid:JVNDB-2017-008295date:2017-10-13T00:00:00
db:CNNVDid:CNNVD-201709-992date:2017-09-28T00:00:00
db:NVDid:CVE-2017-14651date:2017-09-21T18:29:00.167