CVE-2001-0520 : Détail

CVE-2001-0520

2.71%V4
Network
2001-07-27
02h00 +00:00
2017-12-18
20h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Aladdin eSafe Gateway versions 3.0 and earlier allows a remote attacker to circumvent filtering of SCRIPT tags by embedding the scripts within certain HTML tags including (1) onload in the BODY tag, (2) href in the A tag, (3) the BUTTON tag, (4) the INPUT tag, or (5) any other tag in which scripts can be defined.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 20869

Date de publication : 2001-05-19 22h00 +00:00
Auteur : eDvice Security Services
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/2750/info eSafe Gateway is a security utility used for filtering internet content. An html file may be crafted to bypass the script-filtering feature offered by eSafe Gateway. This is done by simply changing the syntax of the <SCRIPT> function in such a way as to trick the filter into generating html that still includes a call to execute the script. Note: There are currently conflicting details regarding this vulnerability. It has been reported that version 3.0 of eSafe Gateway is not vulnerable. The author of the advisory insists that versions 2.x are vulnerable, while the vendor claims that script filtering was not a feature in these versions. Forthcoming updates will be released as more information becomes available. Details ---------------------- Let's say for example that we want the following HTML code to enter an organization and the script it contains to be executed: <HTML><HEAD></HEAD> <BODY> <SCRIPT language="JavaScript"> alert("hi"); </SCRIPT> </BODY></HTML> If we run this page through eSafe's filtering engine, the script will be filtered and the resulting with the following HTML code: <HTML><HEAD></HEAD> <BODY> </BODY></HTML> However, if we create the following code: <HTML><HEAD></HEAD> <BODY> <SCRIPT<script language="javascript"> </script> language="javascript"> alert("hi"); </SCRIPT> </BODY></HTML> Then the inner "<script language="javascript"> </script>" will be extracted and we will be left with the following HTML code: <HTML><HEAD></HEAD> <BODY> <SCRIPT language="javascript"> alert("hi"); </SCRIPT> </BODY></HTML>

Products Mentioned

Configuraton 0

Aladdin_knowledge_systems>>Esafe_gateway >> Version 3.0

    Références