CVE-2008-2929

Current Description

Multiple cross-site scripting (XSS) vulnerabilities in the adminutil library in the Directory Server Administration Express and Directory Server Gateway (DSGW) web interface in Red Hat Directory Server 7.1 before SP7 and 8 EL4 and EL5, and Fedora Directory Server, allow remote attackers to inject arbitrary web script or HTML via input values that use % (percent) escaping.

Referenced by CVEs:CVE-2008-2932

Basic Data

PublishedAugust 29, 2008
Last ModifiedSeptember 29, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-79
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score4.3
SeverityMEDIUM
Exploitability Score8.6
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationFedoraDirectory Server********
    2.3ApplicationRedhatDirectory Server7.1sp1******
    2.3ApplicationRedhatDirectory Server7.1sp2******
    2.3ApplicationRedhatDirectory Server7.1sp3******
    2.3ApplicationRedhatDirectory Server7.1sp4******
    2.3ApplicationRedhatDirectory Server7.1sp5******
    2.3ApplicationRedhatDirectory Server7.1sp6******
    2.3ApplicationRedhatDirectory Server8.0el4******
    2.3ApplicationRedhatDirectory Server8.0el5******

Vulnerable Software List

VendorProductVersions
Fedora Directory Server *
Redhat Directory Server 7.1, 8.0

References

NameSourceURLTags
SSRT080113http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861HP
31565http://secunia.com/advisories/31565SECUNIA
31612http://secunia.com/advisories/31612SECUNIA
31702http://secunia.com/advisories/31702SECUNIA
31777http://secunia.com/advisories/31777SECUNIA
1020772http://securitytracker.com/id?1020772SECTRACK
http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.htmlhttp://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.htmlCONFIRMPatch
30870http://www.securityfocus.com/bid/30870BIDPatch
ADV-2008-2480http://www.vupen.com/english/advisories/2008/2480VUPEN
https://bugzilla.redhat.com/show_bug.cgi?id=454621https://bugzilla.redhat.com/show_bug.cgi?id=454621CONFIRM
rhds-dsgw-dsae-xss(44737)https://exchange.xforce.ibmcloud.com/vulnerabilities/44737XF
oval:org.mitre.oval:def:5877https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5877OVAL
RHSA-2008:0596https://rhn.redhat.com/errata/RHSA-2008-0596.htmlREDHAT
RHSA-2008:0601https://rhn.redhat.com/errata/RHSA-2008-0601.htmlREDHAT
FEDORA-2008-7642https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.htmlFEDORA
FEDORA-2008-7339https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.htmlFEDORA