Vulnerability Name:

CVE-2008-2929 (CCN-44737)

Assigned:2008-08-27
Published:2008-08-27
Updated:2017-09-29
Summary:Multiple cross-site scripting (XSS) vulnerabilities in the adminutil library in the Directory Server Administration Express and Directory Server Gateway (DSGW) web interface in Red Hat Directory Server 7.1 before SP7 and 8 EL4 and EL5, and Fedora Directory Server, allow remote attackers to inject arbitrary web script or HTML via input values that use % (percent) escaping.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-79
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-2929

Source: CCN
Type: HP Security Bulletin HPSBUX02354 SSRT080113 rev.1
HP-UX Running Netscape / Red Hat Directory Server, Remote Cross Site Scripting (XSS) or Remote Denial of Service (DoS)

Source: HP
Type: UNKNOWN
SSRT080113

Source: CCN
Type: RHSA-2008-0596
Critical: Red Hat Directory Server 7.1 Service Pack 7 security update

Source: CCN
Type: RHSA-2008-0601
Moderate: adminutil security update

Source: CCN
Type: RHSA-2008-0602
Moderate: redhat-ds-base and redhat-ds-admin security and bug fix update

Source: CCN
Type: SA31565
Red Hat Directory Server Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
31565

Source: SECUNIA
Type: UNKNOWN
31612

Source: CCN
Type: SA31627
Red Hat Directory Server Denial of Service Vulnerabilities

Source: CCN
Type: SA31702
HP-UX update for Netscape / Red Hat Directory Server

Source: SECUNIA
Type: UNKNOWN
31702

Source: CCN
Type: SA31777
Fedora update for adminutil

Source: SECUNIA
Type: UNKNOWN
31777

Source: CCN
Type: SECTRACK ID: 1020772
Red Hat Directory Server Administration Express and Directory Server Gateway Input Validation Hole Permits Cross-Site Scripting Attacks

Source: SECTRACK
Type: UNKNOWN
1020772

Source: CCN
Type: Red Hat Web site
Red Hat Directory Server

Source: CONFIRM
Type: Patch
http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html

Source: BID
Type: Patch
30870

Source: CCN
Type: BID-30870
Red Hat Directory Server Multiple Cross Site Scripting Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2008-2480

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=454621

Source: XF
Type: UNKNOWN
rhds-dsgw-dsae-xss(44737)

Source: XF
Type: UNKNOWN
rhds-dsgw-dsae-xss(44737)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:5877

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0596

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0601

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-7642

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-7339

Vulnerable Configuration:Configuration 1:
  • cpe:/a:fedora:directory_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:directory_server:7.1:sp1:*:*:*:*:*:*
  • OR cpe:/a:redhat:directory_server:7.1:sp2:*:*:*:*:*:*
  • OR cpe:/a:redhat:directory_server:7.1:sp3:*:*:*:*:*:*
  • OR cpe:/a:redhat:directory_server:7.1:sp4:*:*:*:*:*:*
  • OR cpe:/a:redhat:directory_server:7.1:sp5:*:*:*:*:*:*
  • OR cpe:/a:redhat:directory_server:7.1:sp6:*:*:*:*:*:*
  • OR cpe:/a:redhat:directory_server:8.0:el4:*:*:*:*:*:*
  • OR cpe:/a:redhat:directory_server:8.0:el5:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:redhat:directory_server:7.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:5877
    V
    HP-UX Running Netscape / Red Hat Directory Server, Remote Cross Site Scripting (XSS) or Remote Denial of Service (DoS)
    2015-04-20
    BACK
    fedora directory server *
    redhat directory server 7.1 sp1
    redhat directory server 7.1 sp2
    redhat directory server 7.1 sp3
    redhat directory server 7.1 sp4
    redhat directory server 7.1 sp5
    redhat directory server 7.1 sp6
    redhat directory server 8.0 el4
    redhat directory server 8.0 el5
    redhat directory server 7.1
    hp hp-ux b.11.11
    hp hp-ux b.11.23
    redhat enterprise linux 4
    hp hp-ux b.11.31