{"vuid":"VU#867980","idnumber":"867980","name":"Silver Peak VX is vulnerable to cross-site request forgery and cross-site scripting","keywords":["silver peak","csrf","xss"],"overview":"Silver Peak VX version 6.2.2.0_47968 is vulnerable to cross-site request forgery and cross-site scripting.","clean_desc":"CWE-352: Cross-Site Request Forgery (CSRF) - CVE-2014-2974\nSilver Peak VX version 6.2.2.0_47968 contains a cross-site request forgery vulnerability in /php/user_account.php that allows an unauthenticated user to create a new administrator account. CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CVE-2014-2975\nSilver Peak VX version 6.2.2.0_47968 also contains a reflected cross-site scripting vulnerability in /php/user_account.php that can allow an attacker to inject arbitrary HTML content (including scripts) via the vulnerable query string parameter user_id . The CVSS score below applies to the CVE-2013-2975 vulnerability.","impact":"An attacker can conduct a cross-site scripting or cross-site request forgery attack, which could be used for privilege escalation or to inject arbitrary HTML content (including script) into a web page presented to the user.","resolution":"Apply an Update\nSilver Peak has provided an update to fix CVE-2014-2975 in Silver Peak VX 6.2.4. CVE-2014-2974 is expected to be addressed \"in the next maintenance release\" according to the vendor.","workarounds":"","sysaffected":"","thanks":"Thanks to William Costa for reporting this vulnerability.","author":"This document was written by Chris King.","public":["http://www.silver-peak.com/products-solutions/wan-optimization/vx-software","http://cwe.mitre.org/data/definitions/79.html","http://cwe.mitre.org/data/definitions/352.html"],"cveids":["CVE-2014-2974","CVE-2014-2975"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-03-31T13:49:19Z","publicdate":"2014-07-28T00:00:00Z","datefirstpublished":"2014-07-28T13:06:24Z","dateupdated":"2014-07-28T13:06:27Z","revision":17,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"TF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"N","cvss_targetdistribution":"N","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"5","cvss_basevector":"AV:N/AC:L/Au:N/C:N/I:P/A:N","cvss_temporalscore":"4","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:N/TD:N/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}