CERTA-2008-AVI-217

Vulnerability from certfr_avis - Published: 2008-04-18 - Updated: 2008-04-18

BusinessObjects XI est un gestionnaire de contenu en ligne (CMS) vulnérable à une attaque de type XSS.

Description

Les valeurs passées lors de l'identification ne sont pas correctement validées. Une personne malveillante peut, à l'aide de paramètres spécialement écrits, exécuter indirectement du code dans le navigateur de l'utilisateur avec le niveau de confiance associé au site utilisant BusinessObjects XI.

Solution

Se référer au bulletin de sécurité de BusinessObjects XI d'avril pour l'obtention des correctifs (cf. section Documentation).

BusinessObjects XI SP3 FP3.4 et antérieures

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eBusinessObjects XI SP3 FP3.4 et ant\u00e9rieures\u003c/P\u003e",
  "content": "## Description\n\nLes valeurs pass\u00e9es lors de l\u0027identification ne sont pas correctement\nvalid\u00e9es. Une personne malveillante peut, \u00e0 l\u0027aide de param\u00e8tres\nsp\u00e9cialement \u00e9crits, ex\u00e9cuter indirectement du code dans le navigateur\nde l\u0027utilisateur avec le niveau de confiance associ\u00e9 au site utilisant\nBusinessObjects XI.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de BusinessObjects XI d\u0027avril pour\nl\u0027obtention des correctifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2008-04-18T00:00:00",
  "last_revision_date": "2008-04-18T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 de BusinessObjects XI d\u0027avril :",
      "url": "http://www.france.businessobjects.com/products/businessobjectsxi/default.asp"
    }
  ],
  "reference": "CERTA-2008-AVI-217",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2008-04-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    }
  ],
  "summary": "BusinessObjects XI est un gestionnaire de contenu en ligne (\u003cspan\nclass=\"textit\"\u003eCMS\u003c/span\u003e) vuln\u00e9rable \u00e0 une attaque de type \u003cspan\nclass=\"textit\"\u003eXSS\u003c/span\u003e.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans BusinessObjects XI",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 de BusinessObjects XI d\u0027avril 2008",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…