Vulnerability Name:

CVE-2004-2580 (CCN-17133)

Assigned:2004-08-26
Published:2004-08-26
Updated:2017-07-11
Summary:Cross-site scripting (XSS) vulnerability in Novell iChain 2.3 allows remote attackers to obtain login credentials via unspecified vectors.
CVSS v3 Severity:4.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2004-2580

Source: CCN
Type: SA12366
iChain Multiple Vulnerabilities

Source: SECUNIA
Type: Patch, Vendor Advisory
12366

Source: CCN
Type: SECTRACK ID: 1011074
Novell iChain Has Multiple Bugs That Let Remote Users Bypass ACLs, Deny Service, and Conduct Cross-Site Scripting Attacks

Source: SECTRACK
Type: Patch
1011074

Source: CCN
Type: Novell Technical Information Document TID2969621
iChain 2.3 Support Pack 1 Beta 1

Source: OSVDB
Type: UNKNOWN
9267

Source: CCN
Type: OSVDB ID: 9267
Novell iChain Login Credential XSS

Source: BID
Type: Patch
11061

Source: CCN
Type: BID-11061
Novell iChain Multiple Remote Vulnerabilities

Source: XF
Type: UNKNOWN
ichain-xss(17133)

Source: XF
Type: UNKNOWN
ichain-xss(17133)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:ichain:2.3:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:netware:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:ichain:2.3:*:*:*:*:*:*:*
  • AND
  • cpe:/o:novell:netware:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell ichain 2.3
    novell netware 6.5
    novell ichain 2.3
    novell netware 5.1
    novell netware 6.0