{"vuid":"VU#558132","idnumber":"558132","name":"Dell OpenManage Server Administrator contains a cross-site scripting vulnerability","keywords":["dell","openmanage","xss"],"overview":"Dell OpenManage Server Administrator version 7.1 and earlier contains a cross-site scripting vulnerability.","clean_desc":"Dell OpenManage Server Administrator version 7.1 and earlier contains a cross-site scripting vulnerability (CWE-79).","impact":"A remote attacker may be able to execute arbitrary script in the context of the end-user's browser session.","resolution":"Apply an Update Users should download the appropriate patch for the version of OpenManage they have installed. OpenManage Server Administrator Managed Node Patch for OM7.1 (Version 7.1.0.1)\nOpenManage Server Administrator Managed Node Patch for OM7.0 (Version 7.0.0.1)\nOpenManage Server Administrator Managed Node Patch for OM6.5 (Version 6.5.0.1)","workarounds":"Restrict Access The Dell OpenManage Server Administrator interface should not be Internet facing.","sysaffected":"","thanks":"Thanks to David Ferrest and Dell for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["http://cwe.mitre.org/data/definitions/79.html","http://www.dell.com/support/drivers/us/en/19/DriverDetails/Product/poweredge-r710?driverId=5JDN0&osCode=WNET&fileId=3082293694","http://www.dell.com/support/drivers/us/en/19/DriverDetails/Product/poweredge-r710?driverId=PCXMR&osCode=WNET&fileId=3082295344","http://www.dell.com/support/drivers/us/en/19/DriverDetails/Product/poweredge-r710?driverId=JJMWP&osCode=WNET&fileId=3082295338"],"cveids":["CVE-2012-4955"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2012-11-01T13:04:14Z","publicdate":"2012-10-31T00:00:00Z","datefirstpublished":"2012-11-14T14:43:02Z","dateupdated":"2012-11-14T14:48:26Z","revision":12,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"5","cvss_basevector":"AV:N/AC:L/Au:N/C:N/I:P/A:N","cvss_temporalscore":"3.9","cvss_environmentalscore":"2.9","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}