{"vuid":"VU#193529","idnumber":"193529","name":"Dell KACE K2000 Appliance contains multiple reflected cross-site scripting vulnerabilities","keywords":["Dell KACE"],"overview":"The administrative web interface for the Dell KACE K2000 System Deployment Appliance contains multiple cross-site scripting vulnerabilities.","clean_desc":"The Dell KACE K2000 Deployment Appliance is an integrated systems provisioning product for large-scale operating systems deployment. Several components that support the administrative web interface supplied with the system are vulnerable to reflected (i.e., non-persistent) script injection. A malicious link supplied by the attacker (e.g., in email or another web page) can cause the vulnerable web server to reflect injected code back to the user's browser, where it is executed in the context of the affected site. The vulnerable components require the victim user to be authenticated to the affected system in order for the attacker's script to be executed.","impact":"A remote attacker may be able to access the cookies, session tokens, or other sensitive information of a user authenticated to the affected system.","resolution":"We are currently unaware of a practical solution to this problem.","workarounds":"","sysaffected":"","thanks":"Thanks to \nTenable Network Security\n for reporting this vulnerability.","author":"This document was written by Chad Dougherty.","public":["h","t","t","p",":","/","/","w","w","w",".","k","a","c","e",".","c","o","m","/","s","u","p","p","o","r","t","/","k","b","/","i","n","d","e","x",".","p","h","p","?","a","c","t","i","o","n","=","a","r","t","i","k","e","l","&","i","d","=","1","1","2","0","&","a","r","t","l","a","n","g","=","e","n"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-10-13T15:23:07Z","publicdate":"2011-11-03T00:00:00Z","datefirstpublished":"2011-11-08T20:02:39Z","dateupdated":"2011-11-08T20:02:39Z","revision":15,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"5","cam_impact":"10","cam_easeofexploitation":"2","cam_attackeraccessrequired":"20","cam_scorecurrent":"0.75","cam_scorecurrentwidelyknown":"0.9375","cam_scorecurrentwidelyknownexploited":"1.6875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.75,"vulnote":null}