SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   HP XP P9000 Command View Advanced Edition Vendors:   HPE
(HPE Issues Fix for HP XP P9000 Command View Advanced Edition) Adobe LiveCycle XML Document Processing Flaw Lets Remote Users Conduct Cross-Site Request Forgery Attacks
SecurityTracker Alert ID:  1035504
SecurityTracker URL:  http://securitytracker.com/id/1035504
CVE Reference:   CVE-2015-5255   (Links to External Site)
Date:  Apr 7 2016
Impact:   Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Adobe LiveCycle. A remote user can conduct cross-site request forgery attacks. HP XP P9000 Command View Advanced Edition is affected.

A remote user can create a specially crafted XML document that, when loaded by the target authenticated user, will take actions on the target interface acting as the target user.

The vulnerability resides in the BlazeDS component.

James Kettle of PortSwigger Web Security reported this vulnerability.

Impact:   A remote user can take actions on the target system acting as the target authenticated user.
Solution:   HPE has issued a fix for XP7 Command View Advanced Edition Suite and HP XP P9000 Command View Advanced Edition.

The HPE advisory is available at:

http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05073670

Vendor URL:  h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05073670 (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (SuSE), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Nov 20 2015 Adobe LiveCycle XML Document Processing Flaw Lets Remote Users Conduct Cross-Site Request Forgery Attacks



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC