CERTA-2012-AVI-013

Vulnerability from certfr_avis - Published: 2012-01-11 - Updated: 2012-01-11

Une vulnérabilité dans Microsoft AntiXSS permet de réaliser une injection de code indirecte (XSS).

Description

Microsoft AntiXSS est une bibliothèque pouvant être utilisée sur un serveur web pour le protéger d'attaques de type XSS (injection de code indirecte). Cette bibliothèque comporte une vulnérabilité permettant à un attaquant distant d'effectuer une attaque XSS.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Microsoft AntiXSS en versions antérieures à 4.2

Impacted products
Vendor Product Description
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eMicrosoft AntiXSS en versions  ant\u00e9rieures \u00e0 4.2\u003c/p\u003e",
  "content": "## Description\n\nMicrosoft AntiXSS est une biblioth\u00e8que pouvant \u00eatre utilis\u00e9e sur un\nserveur web pour le prot\u00e9ger d\u0027attaques de type XSS (injection de code\nindirecte). Cette biblioth\u00e8que comporte une vuln\u00e9rabilit\u00e9 permettant \u00e0\nun attaquant distant d\u0027effectuer une attaque XSS.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2012-0007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0007"
    }
  ],
  "initial_release_date": "2012-01-11T00:00:00",
  "last_revision_date": "2012-01-11T00:00:00",
  "links": [],
  "reference": "CERTA-2012-AVI-013",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2012-01-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 dans Microsoft AntiXSS permet de r\u00e9aliser une\ninjection de code indirecte (XSS).\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Microsoft AntiXSS",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS12-007 du 10 janvier 2012",
      "url": "http://technet.microsoft.com/en-us/security/bulletin/MS12-007"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…