{"vuid":"VU#815532","idnumber":"815532","name":"ForeScout CounterACT reflected XSS vulnerability","keywords":["ForeScout","CounterACT","XSS","reflected","CWE-79"],"overview":"The ForeScout CounterACT appliance contains reflected cross-site scripting (XSS) vulnerabilities.","clean_desc":"The web interface of the ForeScout CounterACT appliance contains reflected XSS vulnerabilities (CWE-79). The following are a couple examples: hxxp://xxx.xxx.xxx.xxx/status?username=test\"><script>alert(1);</script>\nhxxp://xxx.xxx.xxx.xxx/status?action=4362907358160917120&forgotpass=true&loginname=test<script>alert(1);</script> Additional details may be found in ForeScout Security Advisory 12-01. (Login Required)","impact":"A remote attacker may, by luring a user into clicking a malicious URL, be able to disclose sensitive information, steal user cookies, or escalate privileges.","resolution":"Apply an Update\nCounterACT 6.3.3.2 install Hotfix 4.12050\nCounterACT 6.3.4.0 install Hotfix 10.0\nCounterACT 6.3.4.1 install Hotfix 6.0\nCounterACT 6.3.4.10 install Hotfix 1.0 Customers may obtain these patches automatically via the \"Check For Updates\" function or by logging into the  ForeScout Customer Support Portal. (Login Required)","workarounds":"","sysaffected":"","thanks":"Thanks to Travis Lee for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["http://updates.forescout.com/support","http://cwe.mitre.org/data/definitions/79.html"],"cveids":["CVE-2012-1825"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2012-04-23T16:28:22Z","publicdate":"2012-06-07T00:00:00Z","datefirstpublished":"2012-06-08T12:06:28Z","dateupdated":"2013-05-15T19:33:15Z","revision":24,"vrda_d1_directreport":"1","vrda_d1_population":"1","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4.3","cvss_basevector":"AV:N/AC:M/Au:N/C:N/I:P/A:N","cvss_temporalscore":"3.4","cvss_environmentalscore":"3.4","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}