CVE-2008-2929

Multiple cross-site scripting (XSS) vulnerabilities in the adminutil library in the Directory Server Administration Express and Directory Server Gateway (DSGW) web interface in Red Hat Directory Server 7.1 before SP7 and 8 EL4 and EL5, and Fedora Directory Server, allow remote attackers to inject arbitrary web script or HTML via input values that use % (percent) escaping.
References
Link Resource
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861
http://secunia.com/advisories/31565
http://secunia.com/advisories/31612
http://secunia.com/advisories/31702
http://secunia.com/advisories/31777
http://securitytracker.com/id?1020772
http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html Patch
http://www.securityfocus.com/bid/30870 Patch
http://www.vupen.com/english/advisories/2008/2480
https://bugzilla.redhat.com/show_bug.cgi?id=454621
https://exchange.xforce.ibmcloud.com/vulnerabilities/44737
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5877
https://rhn.redhat.com/errata/RHSA-2008-0596.html
https://rhn.redhat.com/errata/RHSA-2008-0601.html
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861
http://secunia.com/advisories/31565
http://secunia.com/advisories/31612
http://secunia.com/advisories/31702
http://secunia.com/advisories/31777
http://securitytracker.com/id?1020772
http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html Patch
http://www.securityfocus.com/bid/30870 Patch
http://www.vupen.com/english/advisories/2008/2480
https://bugzilla.redhat.com/show_bug.cgi?id=454621
https://exchange.xforce.ibmcloud.com/vulnerabilities/44737
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5877
https://rhn.redhat.com/errata/RHSA-2008-0596.html
https://rhn.redhat.com/errata/RHSA-2008-0601.html
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fedora:directory_server:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:directory_server:7.1:sp1:*:*:*:*:*:*
cpe:2.3:a:redhat:directory_server:7.1:sp2:*:*:*:*:*:*
cpe:2.3:a:redhat:directory_server:7.1:sp3:*:*:*:*:*:*
cpe:2.3:a:redhat:directory_server:7.1:sp4:*:*:*:*:*:*
cpe:2.3:a:redhat:directory_server:7.1:sp5:*:*:*:*:*:*
cpe:2.3:a:redhat:directory_server:7.1:sp6:*:*:*:*:*:*
cpe:2.3:a:redhat:directory_server:8.0:el4:*:*:*:*:*:*
cpe:2.3:a:redhat:directory_server:8.0:el5:*:*:*:*:*:*

History

21 Nov 2024, 00:48

Type Values Removed Values Added
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861 - () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861 -
References () http://secunia.com/advisories/31565 - () http://secunia.com/advisories/31565 -
References () http://secunia.com/advisories/31612 - () http://secunia.com/advisories/31612 -
References () http://secunia.com/advisories/31702 - () http://secunia.com/advisories/31702 -
References () http://secunia.com/advisories/31777 - () http://secunia.com/advisories/31777 -
References () http://securitytracker.com/id?1020772 - () http://securitytracker.com/id?1020772 -
References () http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html - Patch () http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html - Patch
References () http://www.securityfocus.com/bid/30870 - Patch () http://www.securityfocus.com/bid/30870 - Patch
References () http://www.vupen.com/english/advisories/2008/2480 - () http://www.vupen.com/english/advisories/2008/2480 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=454621 - () https://bugzilla.redhat.com/show_bug.cgi?id=454621 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/44737 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/44737 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5877 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5877 -
References () https://rhn.redhat.com/errata/RHSA-2008-0596.html - () https://rhn.redhat.com/errata/RHSA-2008-0596.html -
References () https://rhn.redhat.com/errata/RHSA-2008-0601.html - () https://rhn.redhat.com/errata/RHSA-2008-0601.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html - () https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html - () https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html -

Information

Published : 2008-08-29 18:41

Updated : 2024-11-21 00:48


NVD link : CVE-2008-2929

Mitre link : CVE-2008-2929

CVE.ORG link : CVE-2008-2929


JSON object : View

Products Affected

fedora

  • directory_server

redhat

  • directory_server
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')