Lucene search

K
certCERTVU:989144
HistoryDec 05, 2006 - 12:00 a.m.

Google Mini and Google Search Appliance vulnerable to cross-site scripting

2006-12-0500:00:00
www.kb.cert.org
11

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.219

Percentile

96.5%

Overview

Google Mini and Google Search Appliance fail to properly handle UTF-7 encoded URIs. This vulnerability may allow a remote attacker to read or modify data in web pages.

Description

Google Mini and Google Search Appliance fail to properly handle UTF-7 encoded URIs, possibly allowing a remote attacker to inject arbitrary content, including script.


Impact

A remote, unauthenticated attacker may be able to read or modify data in web pages and web page related resources, such as cookies.


Solution


Apply a Workaround

Google has provided workarounds for their customers.

* For Google Mini, M2-series and MID-series see [Google Advisory ga-2006-11-m ](<https://support.google.com/enterprise/login?dest=%2Fenterprise%2Fdoc%2Fmini%2Fadvisories%2Fga-2006-11-m.html>)(requires customer login). 
* For Google Search Appliance, all models, see [Google Advisory ga-2006-11-g ](<https://support.google.com/enterprise/login?dest=%2Fenterprise%2Fdoc%2Fgsa%2Fadvisories%2Fga-2006-11-g.html>)(requires customer login).

Disable scripting

Disable scripting in your web browser, as specified in the Securing Your Web Browser document and the Malicious Web Scripts FAQ.

Do not follow unsolicited links

In order to convince users to visit their sites, attackers often use URL encoding, IP address variations, long URLs, intentional misspellings, and other techniques to create misleading links. Do not click on unsolicited links received in email, instant messages, web forums, or internet relay chat (IRC) channels. Type URLs directly into the browser to avoid these misleading links. While these are generally good security practices, following these behaviors will not prevent exploitation of this vulnerability in all cases, particularly if a trusted site has been compromised or allows cross-site scripting.

Vendor Information

989144

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Google __ Affected

Notified: November 28, 2006 Updated: December 05, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Google has provided workarounds for their customers.

* For Google Mini, M2-series and MID-series see [Google Advisory ga-2006-11-m ](<https://support.google.com/enterprise/login?dest=%2Fenterprise%2Fdoc%2Fmini%2Fadvisories%2Fga-2006-11-m.html>)(requires customer login). 
* For Google Search Appliance, all models, see [Google Advisory ga-2006-11-g ](<https://support.google.com/enterprise/login?dest=%2Fenterprise%2Fdoc%2Fgsa%2Fadvisories%2Fga-2006-11-g.html>)(requires customer login). 

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23989144 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Maluc to RSnake at ha.ckers.org and to John Herron at NIST.org

This document was written by Jeff Gennari, Ryan Giobbi, and Chris Taschner.

Other Information

CVE IDs: CVE-2006-6223
Severity Metric: 11.60 Date Public:

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.219

Percentile

96.5%

Related for VU:989144