Vulnerability Name:

CVE-2009-2897 (CCN-53658)

Assigned:2009-10-02
Published:2009-10-02
Updated:2018-10-10
Summary:Multiple cross-site scripting (XSS) vulnerabilities in hq/web/common/GenericError.jsp in the generic exception handler in the web interface in SpringSource Hyperic HQ 3.2.x before 3.2.6.1, 4.0.x before 4.0.3.1, 4.1.x before 4.1.2.1, and 4.2-beta1; Application Management Suite (AMS) 2.0.0.SR3; and tc Server 6.0.20.B allow remote attackers to inject arbitrary web script or HTML via invalid values for numerical parameters, as demonstrated by an uncaught java.lang.NumberFormatException exception resulting from (1) the typeId parameter to mastheadAttach.do, (2) the eid parameter to Resource.do, and (3) the u parameter in a view action to admin/user/UserAdmin.do.
Note: some of these details are obtained from third party information.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-79
Vulnerability Consequences:Gain Access
References:Source: MISC
Type: Exploit, Patch
http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=advisory&name=Hyperic_HQ_Multiple_XSS

Source: MITRE
Type: CNA
CVE-2009-2897

Source: CONFIRM
Type: UNKNOWN
http://forums.hyperic.com/jiveforums/thread.jspa?messageID=22156嚌

Source: CONFIRM
Type: Exploit
http://jira.hyperic.com/browse/HHQ-2655

Source: CCN
Type: SA36935
Hyperic HQ Cross-Site Scripting and Script Insertion Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
36935

Source: MISC
Type: Exploit, Patch
http://www.coresecurity.com/content/hyperic-hq-vulnerabilities

Source: OSVDB
Type: UNKNOWN
58608

Source: OSVDB
Type: UNKNOWN
58609

Source: OSVDB
Type: UNKNOWN
58610

Source: CCN
Type: OSVDB ID: 58608
Hyperic HQ mastheadAttach.do typeId Parameter XSS

Source: CCN
Type: OSVDB ID: 58609
Hyperic HQ Resource.do eid Parameter XSS

Source: CCN
Type: OSVDB ID: 58610
Hyperic HQ admin/user/UserAdmin.do u Parameter XSS

Source: BUGTRAQ
Type: UNKNOWN
20091003 CORE-2009-0812-Hyperic HQ Multiple XSS

Source: BUGTRAQ
Type: UNKNOWN
20091002 CVE-2009-2897: Hyperic HQ - Reflected XSS in stack trace

Source: CCN
Type: BID-42141
Multiple SpringSource Products HTML Injection and Multiple Cross-Site Scripting Vulnerabilities

Source: CCN
Type: Spring Source Web Page
Hyperic HQ Known Vulnerabilities

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.springsource.com/security/hyperic-hq

Source: XF
Type: UNKNOWN
hyperichq-mastheadattach-xss(53658)

Source: XF
Type: UNKNOWN
hyperichq-mastheadattach-xss(53658)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:springsource:application_management_suite:2.0.0:sr3:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:3.2:beta_1:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:3.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:3.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:3.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:3.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:3.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:3.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:4.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:4.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:4.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:springsource:hyperic_hq:4.2:beta_1:*:*:*:*:*:*
  • OR cpe:/a:springsource:tc_server:6.0.20:b:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:springsource:tc_server:6.0.20:b:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    springsource application management suite 2.0.0 sr3
    springsource hyperic hq 3.2 beta_1
    springsource hyperic hq 3.2.0
    springsource hyperic hq 3.2.1
    springsource hyperic hq 3.2.2
    springsource hyperic hq 3.2.3
    springsource hyperic hq 3.2.4
    springsource hyperic hq 3.2.5
    springsource hyperic hq 3.2.6
    springsource hyperic hq 4.0.0
    springsource hyperic hq 4.0.1
    springsource hyperic hq 4.0.2
    springsource hyperic hq 4.0.3
    springsource hyperic hq 4.1.0
    springsource hyperic hq 4.1.1
    springsource hyperic hq 4.1.2
    springsource hyperic hq 4.2 beta_1
    springsource tc server 6.0.20 b
    springsource tc server 6.0.20 b