{"vuid":"VU#868948","idnumber":"868948","name":"HP ArcSight contains multiple vulnerabilities","keywords":["hp","arcsight","cwe-434","cwe-285","cwe-79","cwe-352","cwe-611"],"overview":"HP ArcSight Logger and ESM contains multiple vulnerabilities.","clean_desc":"CWE-434: Unrestricted Upload of File with Dangerous Type - CVE Pending\nHP ArcSight Logger 5.3.1.6838.0 configuration import file upload capability does not sanitize file names, which allows a remote, authenticated attacker to put arbitrary files into the document root. This vulnerability may allow an attacker to execute arbitrary scripts on the server at the privilege level of the application. CWE-285: Improper Authorization - CVE Pending\nHP ArcSight Logger 5.3.1.6838.0 allows all users access to the Configuration->Input, Configuration->Search and Configuration->Content Management (Import/Export) features. An authenticated attacker may be able to modify ArcSight sources and parsers. CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CVE Pending\nHP ArcSight ESM 6.5.0.1459.0 is vulnerable to cross-frame scripting attacks that may allow an attacker to disrupt or modify rules or resources on the system, depending on the privileges of the logged in user. CWE-352: Cross-Site Request Forgery (CSRF) - CVE Pending\nHP ArcSight ESM 6.5.0.1459.0 is vulnerable to a Cross Site Request Forgery attack that may allow an attacker with knowledge of the resource id to modify rules or resources on the system, depending on the privileges of the logged in user. CWE-611: Improper Restriction of XML External Entity Reference ('XXE') - CVE Pending\nArcSight Logger 5.3.1.6838.0 is vulnerable to a XML External Entity Injection vulnerability in the XML parser in the Configuration->Content Management -> Import section. An authenticated attacker may be able to execute arbitrary scripts on the server at the privilege level of the application.","impact":"These vulnerabilities may allow remote authenticated attackers to disrupt or modify resources on the system and potentially execute arbitrary scripts on the server. Note: The CVSS score reflects the first vulnerability listed.","resolution":"Apply an Update\nHP has provided a security advisory with a link to the patch. These issues were reportedly fixed on 01/21/2015.","workarounds":"","sysaffected":"","thanks":"Thanks to  Julian Horoszkiewicz for reporting this vulnerability.","author":"This document was written by Chris King.","public":["http://www8.hp.com/us/en/software-solutions/siem-security-information-event-management/","http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04562193"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-08-29T14:04:19Z","publicdate":"2015-03-12T00:00:00Z","datefirstpublished":"2015-03-17T18:51:10Z","dateupdated":"2015-03-17T19:04:22Z","revision":19,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"N","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"9","cvss_basevector":"AV:N/AC:L/Au:S/C:C/I:C/A:C","cvss_temporalscore":"7","cvss_environmentalscore":"1.7681355216","cvss_environmentalvector":"CDP:N/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}