JVN#51046809: ArcSight Management Center and ArcSight Logger vulnerable to cross-site scripting
2015-11-20T00:00:00
ID JVN:51046809 Type jvn Reporter Japan Vulnerability Notes Modified 2015-11-20T00:00:00
Description
## Description
ArcSight Management Center and ArcSight Logger from Hewlett-Packard Development Company L.P. contain a stored cross-site scripting vulnerability (CWE-79).
## Impact
An arbitrary script may be executed on the user's web browser.
## Solution
Update the Software
Update to the latest version according to the information provided by the vendor.
## Products Affected
ArcSight Management Center versions prior to v2.1
ArcSight Logger versions prior to v6.1
{"id": "JVN:51046809", "bulletinFamily": "info", "title": "JVN#51046809: ArcSight Management Center and ArcSight Logger vulnerable to cross-site scripting", "description": "\n ## Description\n\nArcSight Management Center and ArcSight Logger from Hewlett-Packard Development Company L.P. contain a stored cross-site scripting vulnerability (CWE-79).\n\n ## Impact\n\nAn arbitrary script may be executed on the user's web browser.\n\n ## Solution\n\n**Update the Software** \nUpdate to the latest version according to the information provided by the vendor.\n\n ## Products Affected\n\n * ArcSight Management Center versions prior to v2.1\n * ArcSight Logger versions prior to v6.1\n", "published": "2015-11-20T00:00:00", "modified": "2015-11-20T00:00:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "href": "http://jvn.jp/en/jp/JVN51046809/index.html", "reporter": "Japan Vulnerability Notes", "references": [], "cvelist": ["CVE-2015-5441"], "type": "jvn", "lastseen": "2019-05-29T19:49:17", "edition": 4, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2015-5441"]}, {"type": "nessus", "idList": ["ARCSIGHT_LOGGER_6_1.NASL"]}], "modified": "2019-05-29T19:49:17", "rev": 2}, "score": {"value": 5.5, "vector": "NONE", "modified": "2019-05-29T19:49:17", "rev": 2}, "vulnersScore": 5.5}, "scheme": null}
{"cve": [{"lastseen": "2021-02-02T06:21:26", "description": "Multiple cross-site scripting (XSS) vulnerabilities in HP ArcSight Management Center before 2.1 and ArcSight Logger before 6.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.", "edition": 6, "cvss3": {}, "published": "2015-11-12T03:59:00", "title": "CVE-2015-5441", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-5441"], "modified": "2018-10-09T19:57:00", "cpe": ["cpe:/a:hp:arcsight_logger:6.0", "cpe:/a:hp:archsight_management_center:2.0"], "id": "CVE-2015-5441", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5441", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:hp:arcsight_logger:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:archsight_management_center:2.0:*:*:*:*:*:*:*"]}], "nessus": [{"lastseen": "2020-09-14T13:16:20", "description": "The remote host has a version of HP ArcSight logger installed that is\nprior to 6.1. It is, therefore, affected by a reflected cross-site\nscripting vulnerability in the Management Center due to improper\nvalidation of user-supplied input. A remote attacker can exploit this,\nvia a specially crafted request, to execute arbitrary script code in a\nuser's browser session.", "edition": 19, "published": "2015-10-16T00:00:00", "title": "HP ArcSight Logger < 6.1 Management Center XSS", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5441"], "modified": "2015-10-16T00:00:00", "cpe": ["cpe:/a:hp:arcsight_logger"], "id": "ARCSIGHT_LOGGER_6_1.NASL", "href": "https://www.tenable.com/plugins/nessus/86419", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86419);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/06/12\");\n\n script_cve_id(\"CVE-2015-5441\");\n script_xref(name:\"HP\", value:\"HPSBGN03507\");\n script_xref(name:\"HP\", value:\"SSRT102181\");\n script_xref(name:\"HP\", value:\"emr_na-c04797406\");\n\n script_name(english:\"HP ArcSight Logger < 6.1 Management Center XSS\");\n script_summary(english:\"Checks the version of HP ArcSight Logger.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host has an application installed that is affected by a\nreflected cross-site scripting vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host has a version of HP ArcSight logger installed that is\nprior to 6.1. It is, therefore, affected by a reflected cross-site\nscripting vulnerability in the Management Center due to improper\nvalidation of user-supplied input. A remote attacker can exploit this,\nvia a specially crafted request, to execute arbitrary script code in a\nuser's browser session.\");\n # https://support.hpe.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04797406\n script_set_attribute(attribute:\"see_also\",value:\"http://www.nessus.org/u?73f00f3d\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to HP ArcSight Logger version 6.1 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-5441\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\",value:\"2015/09/23\");\n script_set_attribute(attribute:\"patch_publication_date\",value:\"2015/09/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/16\");\n\n script_set_attribute(attribute:\"plugin_type\",value:\"local\");\n script_set_attribute(attribute:\"cpe\",value:\"cpe:/a:hp:arcsight_logger\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"arcsight_logger_installed_linux.nasl\");\n script_require_keys(\"installed_sw/ArcSight Logger\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"install_func.inc\");\n\napp = \"ArcSight Logger\";\nport = 0;\n\ninstall = get_single_install(app_name:app, exit_if_unknown_ver:TRUE);\nver = install['version'];\npath = install['path'];\ndisplay_ver = install['display_version'];\n\nfix = '6.1';\ndisplay_fix = '6.1';\n\nif (ver_compare(ver:ver, fix:fix, strict:FALSE) >= 0)\n audit(AUDIT_INST_VER_NOT_VULN, app, display_ver);\n\nset_kb_item(name:\"www/0/XSS\", value:TRUE);\n\nif (report_verbosity > 0)\n{\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + display_ver +\n '\\n Fixed version : ' + display_fix + '\\n';\n security_warning(port:port, extra:report);\n}\nelse security_warning(port);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}