{"vuid":"VU#567774","idnumber":"567774","name":"Imperva SecureSphere management GUI contains an XSS vulnerability","keywords":["Imperva SecureSphere","XSS"],"overview":"An XSS vulnerability exists in the Imperva SecureSphere management GUI.","clean_desc":"Dell SecureWorks' SWRX-2011-001 advisory states: \"A vulnerability exists in Imperva SecureSphere due to improper validation of user-controlled input. User-controllable input is not properly sanitized for illegal or malicious content prior to being stored and later returned to an administrator in dynamically generated web content. Remote attackers could leverage this issue to conduct persistent cross-site scripting attacks. When the malicious content is viewed, arbitrary script or HTML code injected into the affected database field will be executed in the SecureSphere administrative user’s browser session in the security context of the SecureSphere administrative GUI. Successful exploitation may aid an attacker in retrieving session cookies, stealing recently submitted data, or launching further attacks.\" Additional details can be found in Imperva's advisory, Imperva Security Response for CVE-2011-0767.","impact":"An attacker may be able to execute arbitrary script in the security context of the user's browser session accessing the management GUI.","resolution":"Apply an Update\nThe following patches should be applied to the relevant SecureSphere version: SecureSphere 6.2 \tReleases 6442-6463 Patch 30\nSecureSphere 7.0\tReleases 7061-7078 Patch 22\nSecureSphere 7.5 \tRelease 7564 Patch 10\nSecureSphere 8.0 \tRelease 8265 Patch 3\nSecureSphere 8.5 \tRelease 8.5 Patch 1 These patches can be downloaded from Imperva's FTP site. Imperva credentials are required to access the FTP site.","workarounds":"","sysaffected":"","thanks":"Thanks to Sean Talbot of Dell SecureWorks for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["http://www.secureworks.com/research/advisories/SWRX-2011-001/","http://www.imperva.com/resources/adc/adc_advisories_response_secureworks.html","http://app.demand.imperva.com/e/er.aspx?s=466&lid=794&elq=fd4f3793140c4eb8b440d242b3d56e7a"],"cveids":["CVE-2011-0767"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-04-27T18:44:18Z","publicdate":"2011-05-23T00:00:00Z","datefirstpublished":"2011-05-31T17:47:30Z","dateupdated":"2011-05-31T18:06:29Z","revision":14,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"8","cam_exploitation":"8","cam_internetinfrastructure":"8","cam_population":"8","cam_impact":"8","cam_easeofexploitation":"8","cam_attackeraccessrequired":"7","cam_scorecurrent":"1.6128","cam_scorecurrentwidelyknown":"2.4192","cam_scorecurrentwidelyknownexploited":"3.2256","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.6128,"vulnote":null}