CNVD-2018-12125
Vulnerability from cnvd - Published: 2018-06-26
VLAI Severity ?
Title
HP Network Automation跨站脚本漏洞(CNVD-2018-12125)
Description
HP Network Automation Software是网络配置及管理自动化软件。
HP Network Automation存在跨站脚本漏洞,允许远程攻击者利用漏洞注入恶意脚本或HTML代码,当恶意数据被查看时,可获取敏感信息或劫持用户会话。
Severity
中
Patch Name
HP Network Automation跨站脚本漏洞(CNVD-2018-12125)的补丁
Patch Description
HP Network Automation Software是网络配置及管理自动化软件。
HP Network Automation存在跨站脚本漏洞,允许远程攻击者利用漏洞注入恶意脚本或HTML代码,当恶意数据被查看时,可获取敏感信息或劫持用户会话。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158014
Reference
https://securitytracker.com/id/1040900
Impacted products
| Name | ['HP Network Automation 10.00.01', 'HP Network Automation 10.0', 'HP Network Automation 10.10', 'HP Network Automation 10.11.1', 'HP Network Operations Management 2018.02', 'HP Network Operations Management 2017.11', 'HP Network Operations Management 2017.06', 'HP Network Automation 10.50', 'HP Network Automation 10.40', 'HP Network Automation 10.30', 'HP Network Automation 10.20', 'HP Network Automation 10.11', 'HP Network Automation 10.1', 'HP Network Automation 10.00.02'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "104131"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2018-6492"
}
},
"description": "HP Network Automation Software\u662f\u7f51\u7edc\u914d\u7f6e\u53ca\u7ba1\u7406\u81ea\u52a8\u5316\u8f6f\u4ef6\u3002\r\n\r\nHP Network Automation\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u6ce8\u5165\u6076\u610f\u811a\u672c\u6216HTML\u4ee3\u7801\uff0c\u5f53\u6076\u610f\u6570\u636e\u88ab\u67e5\u770b\u65f6\uff0c\u53ef\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u6216\u52ab\u6301\u7528\u6237\u4f1a\u8bdd\u3002",
"discovererName": "HP",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158014",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-12125",
"openTime": "2018-06-26",
"patchDescription": "HP Network Automation Software\u662f\u7f51\u7edc\u914d\u7f6e\u53ca\u7ba1\u7406\u81ea\u52a8\u5316\u8f6f\u4ef6\u3002\r\n\r\nHP Network Automation\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u6ce8\u5165\u6076\u610f\u811a\u672c\u6216HTML\u4ee3\u7801\uff0c\u5f53\u6076\u610f\u6570\u636e\u88ab\u67e5\u770b\u65f6\uff0c\u53ef\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u6216\u52ab\u6301\u7528\u6237\u4f1a\u8bdd\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "HP Network Automation\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff08CNVD-2018-12125\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"HP Network Automation 10.00.01",
"HP Network Automation 10.0",
"HP Network Automation 10.10",
"HP Network Automation 10.11.1",
"HP Network Operations Management 2018.02",
"HP Network Operations Management 2017.11",
"HP Network Operations Management 2017.06",
"HP Network Automation 10.50",
"HP Network Automation 10.40",
"HP Network Automation 10.30",
"HP Network Automation 10.20",
"HP Network Automation 10.11",
"HP Network Automation 10.1",
"HP Network Automation 10.00.02"
]
},
"referenceLink": "https://securitytracker.com/id/1040900",
"serverity": "\u4e2d",
"submitTime": "2018-05-14",
"title": "HP Network Automation\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff08CNVD-2018-12125\uff09"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…