Microsoft System Center Operations Manager CVE-2013-0009 Cross Site Scripting Vulnerability
2013-01-08T00:00:00
ID SMNTC-55401 Type symantec Reporter Symantec Security Response Modified 2013-01-08T00:00:00
Description
Description
Microsoft System Center Operations Manager is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Technologies Affected
Microsoft System Center Operations Manager 2007 R2
Microsoft System Center Operations Manager 2007 SP1
Recommendations
Run all software as a nonprivileged user with minimal access rights.
Attackers may successfully exploit client flaws in the browser through cross-site scripting vulnerabilities. When possible, run client software as regular user accounts with limited access to system resources. This may limit the immediate consequences of client-side vulnerabilities.
Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to detect and block attacks and anomalous activity such as requests containing suspicious URI sequences. Since the webserver may log such requests, review its logs regularly.
Do not follow links provided by unknown or untrusted sources.
Web users should be cautious about following links to websites that are provided by unfamiliar or suspicious sources. Filtering HTML from emails may help remove a possible vector for transmitting malicious links to users.
Set web browser security to disable the execution of script code or active content.
Since exploiting cross-site scripting issues often requires malicious script code to run in browsers, consider disabling script code and active content support within a client browser as a way to prevent a successful exploit. Note that this mitigation tactic might adversely affect legitimate sites that rely on the execution of browser-based script code.
Vendor updates are available. Please see the references for more information.
{"hash": "bba9a989e61ecf05402309175c8d494cc4fe1e90cf3e8b655dbbd681ee6710fa", "id": "SMNTC-55401", "lastseen": "2018-03-12T16:12:10", "viewCount": 2, "hashmap": [{"hash": "bc28500a44367e092c7d91c0af072b19", "key": "affectedSoftware"}, {"hash": "f9fa10ba956cacf91d7878861139efb9", "key": "bulletinFamily"}, {"hash": "59269156ecd80ffcd6355cbcede33cab", "key": "cvelist"}, {"hash": "6e9bdd2021503689a2ad9254c9cdf2b3", "key": "cvss"}, {"hash": "e65119000c062c11a873098947fb59a9", "key": "description"}, {"hash": "ff49d65aba9d176baef85e1d31d96717", "key": "href"}, {"hash": "0b52c40eace4a0be9fce31c10b307158", "key": "modified"}, {"hash": "0b52c40eace4a0be9fce31c10b307158", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "d6218597dc7a1b025a781373296b2b63", "key": "reporter"}, {"hash": "d56d8e73b20d7ec7122a8a383c1a5254", "key": "title"}, {"hash": "52e3bbafc627009ac13caff1200a0dbf", "key": "type"}], "bulletinFamily": "software", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "edition": 2, "enchantments": {"score": {"value": 5.7, "vector": "NONE", "modified": "2018-03-12T16:12:10"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2013-0009"]}, {"type": "openvas", "idList": ["OPENVAS:903100", "OPENVAS:1361412562310903100"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:12818"]}, {"type": "nessus", "idList": ["SMB_NT_MS13-003.NASL"]}], "modified": "2018-03-12T16:12:10"}, "vulnersScore": 5.7}, "type": "symantec", "description": "### Description\n\nMicrosoft System Center Operations Manager is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n\n### Technologies Affected\n\n * Microsoft System Center Operations Manager 2007 R2 \n * Microsoft System Center Operations Manager 2007 SP1 \n\n### Recommendations\n\n**Run all software as a nonprivileged user with minimal access rights.** \nAttackers may successfully exploit client flaws in the browser through cross-site scripting vulnerabilities. When possible, run client software as regular user accounts with limited access to system resources. This may limit the immediate consequences of client-side vulnerabilities. \n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to detect and block attacks and anomalous activity such as requests containing suspicious URI sequences. Since the webserver may log such requests, review its logs regularly.\n\n**Do not follow links provided by unknown or untrusted sources.** \nWeb users should be cautious about following links to websites that are provided by unfamiliar or suspicious sources. Filtering HTML from emails may help remove a possible vector for transmitting malicious links to users. \n\n**Set web browser security to disable the execution of script code or active content.** \nSince exploiting cross-site scripting issues often requires malicious script code to run in browsers, consider disabling script code and active content support within a client browser as a way to prevent a successful exploit. Note that this mitigation tactic might adversely affect legitimate sites that rely on the execution of browser-based script code. \n\nVendor updates are available. Please see the references for more information.\n", "title": "Microsoft System Center Operations Manager CVE-2013-0009 Cross Site Scripting Vulnerability", "history": [{"bulletin": {"hash": "acbbb3584a987813b45fbd84bf231a37cc3dd7ffebf80b7307ef83a1a1d16901", "viewCount": 0, "edition": 1, "lastseen": "2016-09-04T11:42:21", "history": [], "objectVersion": "1.2", "hashmap": [{"hash": "75fee7c8abe13b8cef7760ea2119d655", "key": "affectedSoftware"}, {"hash": "6e9bdd2021503689a2ad9254c9cdf2b3", "key": "cvss"}, {"hash": "0b52c40eace4a0be9fce31c10b307158", "key": "modified"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "d56d8e73b20d7ec7122a8a383c1a5254", "key": "title"}, {"hash": "0b52c40eace4a0be9fce31c10b307158", "key": "published"}, {"hash": "293804892bf41b61784153241f9e6866", "key": "description"}, {"hash": "52e3bbafc627009ac13caff1200a0dbf", "key": "type"}, {"hash": "f9fa10ba956cacf91d7878861139efb9", "key": "bulletinFamily"}, {"hash": "6156742951db5593f5047b4569ec6745", "key": "href"}, {"hash": "59269156ecd80ffcd6355cbcede33cab", "key": "cvelist"}, {"hash": "d6218597dc7a1b025a781373296b2b63", "key": "reporter"}], "cvelist": ["CVE-2013-0009"], "bulletinFamily": "software", "published": "2013-01-08T00:00:00", "description": "### Description\n\nMicrosoft System Center Operations Manager is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. \n\n### Technologies Affected\n\n * Microsoft System Center Operations Manager 2007 R2\n * Microsoft System Center Operations Manager 2007 SP1\n\n### Recommendations\n\n#### Run all software as a nonprivileged user with minimal access rights.\n\nAttackers may successfully exploit client flaws in the browser through cross-site scripting vulnerabilities. When possible, run client software as regular user accounts with limited access to system resources. This may limit the immediate consequences of client-side vulnerabilities. \n\n#### Deploy network intrusion detection systems to monitor network traffic for malicious activity.\n\nDeploy NIDS to detect and block attacks and anomalous activity such as requests containing suspicious URI sequences. Since the webserver may log such requests, review its logs regularly.\n\n#### Do not follow links provided by unknown or untrusted sources.\n\nWeb users should be cautious about following links to websites that are provided by unfamiliar or suspicious sources. Filtering HTML from emails may help remove a possible vector for transmitting malicious links to users. \n\n#### Set web browser security to disable the execution of script code or active content.\n\nSince exploiting cross-site scripting issues often requires malicious script code to run in browsers, consider disabling script code and active content support within a client browser as a way to prevent a successful exploit. Note that this mitigation tactic might adversely affect legitimate sites that rely on the execution of browser-based script code. \n\nVendor updates are available. Please see the references for more information. \n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "id": "SMNTC-55401", "reporter": "Symantec Security Response", "references": [], "affectedSoftware": [{"version": "R2", "name": "Microsoft System Center Operations Manager 2007", "operator": "eq"}, {"version": "2007 SP1", "name": "Microsoft System Center Operations Manager", "operator": "eq"}], "title": "Microsoft System Center Operations Manager CVE-2013-0009 Cross Site Scripting Vulnerability", "modified": "2013-01-08T00:00:00", "enchantments": {"score": {"value": 3.5, "modified": "2016-09-04T11:42:21"}}, "href": "https://www.symantec.com/security_response/vulnerability.jsp?bid=55401", "type": "symantec"}, "lastseen": "2016-09-04T11:42:21", "edition": 1, "differentElements": ["description", "href", "affectedSoftware"]}], "objectVersion": "1.3", "cvelist": ["CVE-2013-0009"], "published": "2013-01-08T00:00:00", "references": [], "reporter": "Symantec Security Response", "affectedSoftware": [{"version": "2007 R2 ", "name": "Microsoft System Center Operations Manager", "operator": "eq"}, {"version": "2007 SP1 ", "name": "Microsoft System Center Operations Manager", "operator": "eq"}], "modified": "2013-01-08T00:00:00", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/55401"}
{"cve": [{"lastseen": "2019-05-29T18:12:59", "bulletinFamily": "NVD", "description": "Cross-site scripting (XSS) vulnerability in Microsoft System Center Operations Manager 2007 SP1 and R2 allows remote attackers to inject arbitrary web script or HTML via crafted input, aka \"System Center Operations Manager Web Console XSS Vulnerability,\" a different vulnerability than CVE-2013-0010.", "modified": "2018-10-12T22:03:00", "id": "CVE-2013-0009", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0009", "published": "2013-01-09T18:09:00", "title": "CVE-2013-0009", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "mskb": [{"lastseen": "2019-11-23T10:16:47", "bulletinFamily": "microsoft", "description": "<html><body><p>Resolves vulnerabilities in Microsoft System Center Operations Manager that could allow elevation of privilege if a user visits an affected website by way of a specially crafted URL.</p><h2>INTRODUCTION</h2><div class=\"kb-summary-section section\">Microsoft has released security bulletin MS13-003. To view the complete security bulletin, visit\u00a0the following Microsoft website: <ul class=\"sbody-free_list\"><li>IT professionals:<br/><div class=\"indent\"><a href=\"http://technet.microsoft.com/security/bulletin/ms13-003\" id=\"kb-link-1\" target=\"_self\">http://technet.microsoft.com/security/bulletin/MS13-003</a></div></li></ul><h3 class=\"sbody-h3\">How to obtain help and support for this security update</h3>Security solutions for IT professionals:<br/><a href=\"http://technet.microsoft.com/security/bb980617.aspx\" id=\"kb-link-2\" target=\"_self\">TechNet Security Troubleshooting and Support</a><br/><br/>Help protect your computer that is running Windows from viruses and malware:<br/><a href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" id=\"kb-link-3\" target=\"_self\">Virus Solution and Security Center</a><br/><br/>Local support according to your country:<br/><a href=\"https://support.microsoft.com/common/international.aspx\" id=\"kb-link-4\" target=\"_self\">International Support</a><br/><br/></div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><h3 class=\"sbody-h3\">Update for all supported versions of System Center Operations Manager 2007 SP1</h3><span>The following file is available for download from the Microsoft Download Center:<br/></span><br/><br/><span><img alt=\"Download \" class=\"graphic\" src=\"/library/images/support/kbgraphics/public/en-us/download.gif\" title=\"Download \"/><a href=\"http://www.microsoft.com/downloads/details.aspx?familyid=f848d74d-fdae-4a19-a0f5-12d2d4389db9\" id=\"kb-link-5\" target=\"_self\">Download the package now.</a></span><br/><br/><span>Release Date: March 12, 2013<br/><br/>For more information about how to download Microsoft support files, click the following article number to view the article in the Microsoft Knowledge Base:<br/><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/119591\" id=\"kb-link-6\">119591 </a> How to obtain Microsoft support files from online services<br/></div>Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to the file.<br/></span><h3 class=\"sbody-h3\">Update for all supported versions of System Center Operations Manager 2007 R2</h3><span>The following file is available for download from the Microsoft Download Center:<br/></span><br/><br/><span><img alt=\"Download \" class=\"graphic\" src=\"/library/images/support/kbgraphics/public/en-us/download.gif\" title=\"Download \"/><a href=\"http://www.microsoft.com/downloads/details.aspx?familyid=4e1ab3bd-af0c-41f8-8ebc-1cdc68a3ee37\" id=\"kb-link-7\" target=\"_self\">Download the package now.</a></span><br/><br/><span>Release Date: January 8, 2013<br/><br/>For more information about how to download Microsoft support files, click the following article number to view the article in the Microsoft Knowledge Base:<br/><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/119591\" id=\"kb-link-8\">119591 </a> How to obtain Microsoft support files from online services</div>Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to the file.<br/></span><h3 class=\"sbody-h3\">Additional information about this security update</h3>The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information. If this is the case, the known issue is listed below each article link.<br/><br/><ul class=\"sbody-free_list\"><li><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/2783850\" id=\"kb-link-9\">2783850 </a> Cumulative Update 7 for System Center Operations Manager 2007 R2 </div></li><li><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/2809182\" id=\"kb-link-10\">2809182 </a> MS13-003: Description of the security update for System Center Operations Manager 2007 SP1: March 12, 2013</div></li></ul><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">File hash information for 2783850</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">SHA1 hash</th><th class=\"sbody-th\">SHA256 hash</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SystemCenterOperationsManager2007-R2CU7-KB2783850-X86-X64-IA64-CHS.MSI</td><td class=\"sbody-td\">EB79C58B062D49B02DD54EA6C4067877DCCE713A</td><td class=\"sbody-td\">07E0F9F30E5F5723BBA85C47A6A25ECA624092573FE298831B8A8CCC0BAA8315</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SystemCenterOperationsManager2007-R2CU7-KB2783850-X86-X64-IA64-DEU.MSI</td><td class=\"sbody-td\">5915522422CC5A14B1BA222F21EB383FE3C36E86</td><td class=\"sbody-td\">D145D62FB0D8462F2F18F4810CE93F0450DB3D7BCE2DBE115DC34F305E3DDAB1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SystemCenterOperationsManager2007-R2CU7-KB2783850-X86-X64-IA64-ENU.MSI</td><td class=\"sbody-td\">CCBD4B9324B44C6955F0EE41253D3B35382226D6</td><td class=\"sbody-td\">5657BFEA17091A0586C8EDB4266468FC6BDF087CBE9A67DC19DCCB25C596CB91</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SystemCenterOperationsManager2007-R2CU7-KB2783850-X86-X64-IA64-ESN.MSI</td><td class=\"sbody-td\">E6F2CCB6E73B2E7D8855C2C4D53B0AEE8C40AC2E</td><td class=\"sbody-td\">39264189B29BEDDF32E20BA192478CEFEC311C84796C591FA1168A326F4A3D8F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SystemCenterOperationsManager2007-R2CU7-KB2783850-X86-X64-IA64-FRA.MSI</td><td class=\"sbody-td\">88B18EC8E40EA3EF6011E5AC30CC40492A6EADB9</td><td class=\"sbody-td\">7509663DA20834A6C8A164C7583FE2DBFF17490E7AAF1501A8898CF190A87064</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SystemCenterOperationsManager2007-R2CU7-KB2783850-X86-X64-IA64-ITA.MSI</td><td class=\"sbody-td\">6F6D8A919BF46C4E8175ADFD8FD35059C5D28707</td><td class=\"sbody-td\">055CAA377A261BA812BEEF0CFB93D64DDF22B13808965C2D7DAD103B18A80088</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SystemCenterOperationsManager2007-R2CU7-KB2783850-X86-X64-IA64-JPN.MSI</td><td class=\"sbody-td\">D7B01773CF22426A21130559D4D27DDD55035803</td><td class=\"sbody-td\">2C30B7949EBDED7123285F63CA1E23ED275ED159DAC24FE8988D03B7E0787DCB</td></tr></table></div></div><br/></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">File hash information for 2809182</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">SHA1 hash</th><th class=\"sbody-th\">SHA256 hash</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-AMD64.msi</td><td class=\"sbody-td\">231A2ED8036F832F68F6FE30B9673D1BE3FC8568</td><td class=\"sbody-td\">84389B9EC9B36B64685BCC97AE7CCF57C831276F12240AB742EEE4E193D25936</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-AMD64.msi</td><td class=\"sbody-td\">381F5E19E6C85F0DDA52D691EB273CD346ABECE1</td><td class=\"sbody-td\">FF78B1DD7BECB1C93BDB601F8EF90D632DCE2AD098E5DCACCEF3C40B01F57933</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-AMD64.msi</td><td class=\"sbody-td\">56AB32E074F08A24F9238BF0ECB99C1E191D3DA4</td><td class=\"sbody-td\">C67E7C2FA858D65EEEA35BC923B9B267C405FF30FBDE427F7A78696BC355794F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-AMD64.msi</td><td class=\"sbody-td\">85EFFD192EE3200A16D93741F4F8B049A5631EAF</td><td class=\"sbody-td\">CE57E5D3A246A0AF0490983EF58AB5FB5691E051DEDA05C54E333A52918EB0F8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-AMD64.msi</td><td class=\"sbody-td\">A9CC2EDF7D23DB0EE4B05517CBD03ADC3FA4D69D</td><td class=\"sbody-td\">FAA7B95866760FC4D5D7172114EC1DF6A6EEDFBF77022CEED736F1377C489D1E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-AMD64.msi</td><td class=\"sbody-td\">BE9CA29C198BBD1ECE4FD850A8B8EBA232D856B3</td><td class=\"sbody-td\">0DB7D0CEEF8D753D8AAAC38796BF750816DB064A661AF21E429B4AFE08116306</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-AMD64.msi</td><td class=\"sbody-td\">CAD7BE63213D63CABC2551FBFD967DA42A887CCB</td><td class=\"sbody-td\">FCC0CF3B36AC0E5CB262700E33E9A29519BF2E0929641D50270195E57AFA5591</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-AMD64.msi</td><td class=\"sbody-td\">CE61E1102F5B2559A88CD65306FC3A274BB41612</td><td class=\"sbody-td\">8A1C1309F4B4ABDF51D9E4259F59F56F650D1E56AE1B1EA936B3A04839DC7F47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-AMD64.msi</td><td class=\"sbody-td\">D5BFBABC15632FDE7954AB08AD054DE4B3E47288</td><td class=\"sbody-td\">5F1E42D8601A8CE97581E9F5331B10B00E8C4CDFFF1618A23FB886A82C67147D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-AMD64.msi</td><td class=\"sbody-td\">E3B660F0EB890D8B8CDEB90AAAC4C22CD66EE210</td><td class=\"sbody-td\">33D7E53AA3F11129D63C620671D3962AD62631FED2E557CB9B6499D0E2D3504A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-AMD64.msi</td><td class=\"sbody-td\">FDE57BFEED228EE333C30853B359BFE643798103</td><td class=\"sbody-td\">CE9B36B8FD152A2633A612436051733FB983411C2A6CDA5E867F1D4472665CAD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-i386.msi</td><td class=\"sbody-td\">18526E86F7F3133859A453813A40AE43A50501EB</td><td class=\"sbody-td\">ECC2663574F9B3223461E70CD49938F7CB9D9E9EFBA28A2CD40A177A30F76E20</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-i386.msi</td><td class=\"sbody-td\">2298C713D202D0375AE8C8503B82DB312E219A1F</td><td class=\"sbody-td\">2E1BF6C506A0580C69C07DA0075789BF311E86CDFCC377D81EC0E9EDE32DACE1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-i386.msi</td><td class=\"sbody-td\">482635F5330E200EC9ACAE1FF35EECB0BD1124BA</td><td class=\"sbody-td\">44D014A058724E080EBC54DAD27AECDB31A830CE5E6B9E50E1724B18FCAAA827</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-i386.msi</td><td class=\"sbody-td\">49BC093E1000FA5B10417CE3651443D8BB8CA656</td><td class=\"sbody-td\">A8A276B80148C63CDA03AE9EC77E6FD8ADA18828646ECCF3958B5B003FFA1766</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-i386.msi</td><td class=\"sbody-td\">4B9BB78D480F8A7BADA1B35B0601D79A7FB1106C</td><td class=\"sbody-td\">48B72144E195EF11158158ABE39AB0AC772C2B9B0F803A9372478A6B3B6D52B2</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-i386.msi</td><td class=\"sbody-td\">9601B5775CC1857F9B11C7D17EEDF620C29B39AE</td><td class=\"sbody-td\">276BDDE0B7C4C0A0A1DDFF9E1FBCC0A2190722225EC01A8B69DAC4A299456CC4</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-i386.msi</td><td class=\"sbody-td\">B2C078A26C01FFBD694ACC867AB13DF6E8B6C530</td><td class=\"sbody-td\">CFDD3E69D5F96B48DA6EDA0FFC0881231EFB8C7D174ECDD4318447BF46A01630</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-i386.msi</td><td class=\"sbody-td\">CD4FBE56AA11C60A676B1206B974B0ED757332F9</td><td class=\"sbody-td\">EDFC37C9051CB67B0AFED3C7962EB75ABFBF1ACFB5F51C10BD704EFF379DD0FA</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-i386.msi</td><td class=\"sbody-td\">DE62C8644D31548D02532DD324547DFB4FC6B977</td><td class=\"sbody-td\">C08A351CA777BB2633DC9061BBC91048B086AA4DAE54F8BFD26E096A8408CF99</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SCOM-KB2809182-i386.msi</td><td class=\"sbody-td\">EAE6186631CD15A24F165D0887D8B19F46B0FA06</td><td class=\"sbody-td\">A2232056986BADCF8244C406EEB61FC83994A5B60FCA02EDD699D4040D415CD9</td></tr></table></div></div><br/></span></div></div></div></div></body></html>", "modified": "2013-03-12T16:49:49", "id": "KB2748552", "href": "https://support.microsoft.com/en-us/help/2748552/", "published": "2017-01-07T21:36:23", "title": "MS13-003: Vulnerabilities in System Center Operations Manager could allow elevation of privilege: March 12, 2013", "type": "mskb", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "openvas": [{"lastseen": "2017-07-19T10:50:55", "bulletinFamily": "scanner", "description": "This host is missing an important security update according to\n Microsoft Bulletin MS13-003.", "modified": "2017-07-04T00:00:00", "published": "2013-01-09T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=903100", "id": "OPENVAS:903100", "title": "MS System Center Operations Manager XSS Vulnerabilities (2748552)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_ms13-003.nasl 6520 2017-07-04 14:28:49Z cfischer $\n#\n# MS System Center Operations Manager XSS Vulnerabilities (2748552)\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allow remote attackers to insert script code\n or issue commands to the SCOM server , which will be executed in a user's\n browser session in the context of an affected site.\n Impact Level: Application\";\n\ntag_affected = \"Microsoft System Center Operations Manager 2007 R2\n Microsoft System Center Operations Manager 2007 SP1\";\ntag_insight = \"Input validation error due the way System Center Operations Manager\n handles specially crafted requests, which can be exploited to insert\n arbitrary HTML and script code.\";\ntag_solution = \"Run Windows Update and update the listed hotfixes or download and\n update mentioned hotfixes in the advisory from the below link,\n http://technet.microsoft.com/en-us/security/bulletin/ms13-003\";\ntag_summary = \"This host is missing an important security update according to\n Microsoft Bulletin MS13-003.\";\n\nif(description)\n{\n script_id(903100);\n script_version(\"$Revision: 6520 $\");\n script_cve_id(\"CVE-2013-0009\", \"CVE-2013-0010\");\n script_bugtraq_id(55408, 55401);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-04 16:28:49 +0200 (Tue, 04 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-01-09 10:25:58 +0530 (Wed, 09 Jan 2013)\");\n script_name(\"MS System Center Operations Manager XSS Vulnerabilities (2748552)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/51686/\");\n script_xref(name : \"URL\" , value : \"http://xforce.iss.net/xforce/xfdb/78069\");\n script_xref(name : \"URL\" , value : \"http://xforce.iss.net/xforce/xfdb/78070\");\n script_xref(name : \"URL\" , value : \"http://technet.microsoft.com/en-us/security/bulletin/ms13-003\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 SecPod\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"gb_ms_scom_detect_win.nasl\");\n script_mandatory_keys(\"MS/SCOM/Ver\", \"MS/SCOM/Path\");\n script_require_ports(139, 445);\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_smb_func.inc\");\n\n## Variables Initialization\nkey = \"\";\nversion = \"\";\nexeVer = \"\";\nexchangePath = \"\";\n\n## Check for Microsoft System Center Operations Manager 2007\nscom_name = get_kb_item(\"MS/SCOM/Ver\");\nif(!scom_name) exit(0);\n\nif(\"System Center Operations Manager 2007\" >< scom_name)\n{\n scom_path = get_kb_item(\"MS/SCOM/Path\");\n if(scom_path && \"Could not find the install Location\" >!< scom_path)\n {\n scom_exeVer = fetch_file_version(sysPath: scom_path, file_name:\"Microsoft.Mom.ConfigServiceHost.exe\");\n if(scom_exeVer)\n {\n if(version_in_range(version:scom_exeVer, test_version:\"6.0.5000.0\", test_version2:\"6.0.6278.0\")||\n version_in_range(version:scom_exeVer, test_version:\"6.1.7221.0\", test_version2:\"6.1.7221.109\"))\n {\n security_message(0);\n exit(0);\n }\n }\n }\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2019-05-29T18:38:12", "bulletinFamily": "scanner", "description": "This host is missing an important security update according to\n Microsoft Bulletin MS13-003.", "modified": "2019-05-03T00:00:00", "published": "2013-01-09T00:00:00", "id": "OPENVAS:1361412562310903100", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310903100", "title": "MS System Center Operations Manager XSS Vulnerabilities (2748552)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# MS System Center Operations Manager XSS Vulnerabilities (2748552)\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.903100\");\n script_version(\"2019-05-03T12:31:27+0000\");\n script_cve_id(\"CVE-2013-0009\", \"CVE-2013-0010\");\n script_bugtraq_id(55408, 55401);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"2019-05-03 12:31:27 +0000 (Fri, 03 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2013-01-09 10:25:58 +0530 (Wed, 09 Jan 2013)\");\n script_name(\"MS System Center Operations Manager XSS Vulnerabilities (2748552)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/51686/\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/78069\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/78070\");\n script_xref(name:\"URL\", value:\"http://technet.microsoft.com/en-us/security/bulletin/ms13-003\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 SecPod\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"gb_ms_scom_detect_win.nasl\");\n script_mandatory_keys(\"MS/SCOM/Ver\", \"MS/SCOM/Path\");\n script_require_ports(139, 445);\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote attackers to insert script code\n or issue commands to the SCOM server, which will be executed in a user's\n browser session in the context of an affected site.\");\n script_tag(name:\"affected\", value:\"Microsoft System Center Operations Manager 2007 R2\n Microsoft System Center Operations Manager 2007 SP1\");\n script_tag(name:\"insight\", value:\"Input validation error due the way System Center Operations Manager\n handles specially crafted requests, which can be exploited to insert\n arbitrary HTML and script code.\");\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n script_tag(name:\"summary\", value:\"This host is missing an important security update according to\n Microsoft Bulletin MS13-003.\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nscom_name = get_kb_item(\"MS/SCOM/Ver\");\nif(!scom_name) exit(0);\n\nif(\"System Center Operations Manager 2007\" >< scom_name)\n{\n scom_path = get_kb_item(\"MS/SCOM/Path\");\n if(scom_path && \"Could not find the install Location\" >!< scom_path)\n {\n scom_exeVer = fetch_file_version(sysPath: scom_path, file_name:\"Microsoft.Mom.ConfigServiceHost.exe\");\n if(scom_exeVer)\n {\n if(version_in_range(version:scom_exeVer, test_version:\"6.0.5000.0\", test_version2:\"6.0.6278.0\")||\n version_in_range(version:scom_exeVer, test_version:\"6.1.7221.0\", test_version2:\"6.1.7221.109\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n }\n }\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:50", "bulletinFamily": "software", "description": "Crossite scripting in Web console.", "modified": "2013-01-10T00:00:00", "published": "2013-01-10T00:00:00", "id": "SECURITYVULNS:VULN:12818", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:12818", "title": "Microsoft System Center Operations Manager crossite scripting", "type": "securityvulns", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "nessus": [{"lastseen": "2019-11-03T12:15:46", "bulletinFamily": "scanner", "description": "The version of System Center Operations Manager installed on the remote\nhost has multiple reflected cross-site scripting vulnerabilities in the\nWeb Console component. An attacker could exploit this by tricking a\nuser into requesting a specially crafted URL, resulting in arbitrary\nscript code execution.", "modified": "2019-11-02T00:00:00", "id": "SMB_NT_MS13-003.NASL", "href": "https://www.tenable.com/plugins/nessus/63421", "published": "2013-01-09T00:00:00", "title": "MS13-003: Vulnerabilities in System Center Operations Manager Could Allow Elevation of Privilege (2748552)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(63421);\n script_version(\"1.13\");\n script_cvs_date(\"Date: 2018/11/15 20:50:31\");\n\n script_cve_id(\"CVE-2013-0009\", \"CVE-2013-0010\");\n script_bugtraq_id(55401, 55408);\n script_xref(name:\"IAVB\", value:\"2013-B-0002\");\n script_xref(name:\"MSFT\", value:\"MS13-003\");\n script_xref(name:\"MSKB\", value:\"2783850\");\n script_xref(name:\"MSKB\", value:\"2809182\");\n\n script_name(english:\"MS13-003: Vulnerabilities in System Center Operations Manager Could Allow Elevation of Privilege (2748552)\");\n script_summary(english:\"Checks version of Web Console-specific DLL\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"A web application hosted on the remote Windows system has multiple\ncross-site scripting vulnerabilities.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The version of System Center Operations Manager installed on the remote\nhost has multiple reflected cross-site scripting vulnerabilities in the\nWeb Console component. An attacker could exploit this by tricking a\nuser into requesting a specially crafted URL, resulting in arbitrary\nscript code execution.\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2013/ms13-003\");\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Microsoft has released a set of patches for System Center Operations\nManager 2007 and 2007 R2.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:system_center_operations_manager\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"system_center_operations_mgr_installed.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS13-003';\nkbs = make_list('2783850', '2809182');\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\n# not sure if you can have multiple versions installed on the same system, but this code assumes that you can\npaths = get_kb_list_or_exit('SMB/System Center Operations Manager/Install/*', exit_code:0);\nfailed_shares = make_list();\nvulns = 0;\nconnection_made = FALSE;\n\nforeach path (make_list(paths))\n{\n share = path[0] + '$';\n\n if (!is_accessible_share(share:share))\n {\n failed_shares = list_uniq(make_list(failed_shares, share));\n continue;\n }\n\n # this function returns 0 for not vulnerable, 1 for vulnerable\n path += \"\\Web Console\\bin\";\n file = 'Microsoft.EnterpriseManagement.OperationsManager.Web.ConsoleFramework.dll';\n\n # SCOM 2007 SP1\n vulns += hotfix_is_vulnerable(path:path, file:file, min_version:'6.0.6278.0', version:'6.0.6278.124', bulletin:bulletin, kb:'2809182');\n # SCOM 2007 R2\n vulns += hotfix_is_vulnerable(path:path, file:file, min_version:'6.1.7221.0', version:'6.1.7221.110', bulletin:bulletin, kb:'2783850');\n connection_made = TRUE;\n}\n\nif (connection_made)\n hotfix_check_fversion_end();\n\nif (vulns == 0)\n{\n # the plugin will only alert on connection errors if no vulnerabilities were detected.\n # if some connections failed but some vulnerabilities were detected, partial results are reported\n if (max_index(failed_shares) > 0)\n {\n shares = join(failed_shares, ', ');\n audit(AUDIT_SHARE_FAIL, shares);\n }\n else\n {\n audit(AUDIT_HOST_NOT, 'affected');\n }\n}\n\n# report results\nset_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\nset_kb_item(name:'www/0/XSS', value:TRUE);\nhotfix_security_warning();\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}