{"vuid":"VU#750060","idnumber":"750060","name":"Hewlett-Packard Network Automation contains multiple vulnerabilities","keywords":["hp","clickjacking","xss","csrf"],"overview":"HP Network Automation versions 9.0x, 9.1x, 9.2x, and 10.x contain multiple vulnerabilities affecting the administrative web interface.","clean_desc":"HP Network Automation versions 9.0x, 9.1x, 9.2x, and 10.x contain vulnerabilities in the administrative web interface, including multiple cross site request forgery (CSRF), cross-site scripting (XSS), and clickjacking issues. For more information, review the HP security bulletin.","impact":"A remote, unauthenticated attacker may be able to trick an authenticated user into making an unintentional request to the web server that will be treated as an authentic request, leading to the possibility of privilege escalation, information leakage, code execution, or denial of service.","resolution":"Apply an update HP has released versions 9.22.02 and 10.00.01 to address these vulnerabilities.","workarounds":"","sysaffected":"","thanks":"Thanks to Tim MalcomVetter of FishNet Security for reporting these vulnerabilities.","author":"This document was written by Joel Land.","public":["https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04574207","http://cwe.mitre.org/data/definitions/352.html","http://cwe.mitre.org/data/definitions/79.html","http://cwe.mitre.org/data/definitions/20.html"],"cveids":["CVE-2014-7886"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-09-19T19:39:54Z","publicdate":"2015-04-17T00:00:00Z","datefirstpublished":"2015-04-17T11:59:03Z","dateupdated":"2015-04-17T11:59:07Z","revision":12,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"N","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.8","cvss_basevector":"AV:N/AC:M/Au:N/C:P/I:P/A:P","cvss_temporalscore":"5.3","cvss_environmentalscore":"4.00641675301744","cvss_environmentalvector":"CDP:N/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}