Vulnerability Note VU#114070

NetScreen Instant Virtual Extranet (IVE) platform contains cross-site scripting vulnerability in delhomepage.cgi

Original Release date: 09 Mar 2004 | Last revised: 09 Mar 2004

Overview

NetScreen Instant Virtual Extranet (IVE) platform contains a cross-site scripting vulnerability in the row parameter of delhomepage.cgi, which could allow an attacker to mount a cross-site scripting attack.

Description

The Instant Virtual Extranet platform is an application security gateway that includes a built-in web server. The delhomepage.cgi script does not adequately validate the value of the row parameter. It is possible to use a cross-site scripting technique to inject malicious script (JavaScript, VBScript, etc.) or HTML into a web page using a specially crafted row parameter.

According to NetScreen:

    The scope of the problem is limited because only authenticated users can access the affected URL.

Impact

A remote attacker could access sensitive information related to the vulnerable web page (cookies, form values, URI data). The attacker could also attempt to mislead the user into providing sensitive information such as login credentials.

Solution

Apply Patch
NetScreen has provided a patch to address this vulnerability. For details on obtaining the patch corresponding to your currently installed release, please refer to the NetScreen Advisory.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
NetScreenAffected-09 Mar 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported by Mark Lachniet.

This document was written by Damon Morda.

Other Information

  • CVE IDs: Unknown
  • Date Public: 02 Mar 2004
  • Date First Published: 09 Mar 2004
  • Date Last Updated: 09 Mar 2004
  • Severity Metric: 1.03
  • Document Revision: 11

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.