Vulnerability Name:

CVE-2015-1565 (CCN-101963)

Assigned:2015-02-09
Published:2015-02-09
Updated:2015-02-09
Summary:Cross-site scripting (XSS) vulnerability in the online help in Hitachi Device Manager, Tiered Storage Manager, Replication Manager, and Global Link Manager before 8.1.2-00, and Compute Systems Manager before 7.6.1-08 and 8.x before 8.1.2-00, as used in Hitachi Command Suite, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-79
Vulnerability Consequences:Cross-Site Scripting
References:Source: MITRE
Type: CNA
CVE-2015-1565

Source: SECUNIA
Type: UNKNOWN
62579

Source: SECUNIA
Type: UNKNOWN
62584

Source: CCN
Type: Hitachi Web site
Cross-site Scripting Vulnerability in Hitachi Command Suite Products

Source: CONFIRM
Type: Vendor Advisory
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS15-001/index.html

Source: XF
Type: UNKNOWN
hitachi-cve20151565-xss(101963)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:hitachi:device_manager:*:*:*:*:*:*:*:* (Version <= 8.1.1)
  • OR cpe:/a:hitachi:replication_manager:*:*:*:*:*:*:*:* (Version <= 8.1.1)
  • OR cpe:/a:hitachi:tiered_storage_manager:*:*:*:*:*:*:*:* (Version <= 8.1.1)
  • AND
  • cpe:/o:microsoft:windows:*:*:*:*:*:*:*:*
  • OR cpe:/o:novell:opensuse:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:hitachi:compute_systems_manager:*:*:*:*:*:*:*:* (Version <= 7.6.1)
  • OR cpe:/a:hitachi:compute_systems_manager:8.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:compute_systems_manager:8.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:compute_systems_manager:8.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:global_link_manager:*:*:*:*:*:*:*:* (Version <= 8.1.1)
  • AND
  • cpe:/o:microsoft:windows:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    hitachi device manager *
    hitachi replication manager *
    hitachi tiered storage manager *
    microsoft windows *
    novell opensuse *
    redhat enterprise linux *
    hitachi compute systems manager *
    hitachi compute systems manager 8.0.0
    hitachi compute systems manager 8.1.0
    hitachi compute systems manager 8.1.1
    hitachi global link manager *
    microsoft windows *