CVE-2009-0307
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Cross-site scripting (XSS) vulnerability in the "Customize Statistics Page" (admin/statistics/ConfigureStatistics) in the MDS Connection Service in Research in Motion (RIM) BlackBerry Enterprise Server (BES) before 4.1.6 MR5 allows remote attackers to inject arbitrary web script or HTML via the (1) customDate, (2) interval, (3) lastCustomInterval, (4) lastIntervalLength, (5) nextCustomInterval, (6) nextIntervalLength, (7) action, (8) delIntervalIndex, (9) addStatIndex, (10) delStatIndex, and (11) referenceTime parameters..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- None
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:rim:blackberry_enterprise_server:*:mr4:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:rim:blackberry_enterprise_server:4.0.3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:rim:blackberry_enterprise_server:4.1.5:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:rim:blackberry_enterprise_server:4.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:rim:blackberry_enterprise_server:4.1:sp3:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:rim:blackberry_enterprise_server:4.1.4:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:rim:blackberry_enterprise_server:4.0:sp3:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:rim:blackberry_enterprise_server:4.1.6:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:rim:blackberry_enterprise_server:4.1.3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:rim:blackberry_enterprise_server:4.0:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://secunia.com/advisories/34740
- http://www.blackberry.com/btsc/dynamickc.do?externalId=KB17969&sliceID=1&command=show&fo
- http://www.securityfocus.com/bid/34573
- http://osvdb.org/53772
- http://www.securitytracker.com/id?1022081
- http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0170.html
- http://www.vupen.com/english/advisories/2009/1090
Get started for free to scan for vulnerabilites.
Download Mageni. It is free to get started and can be installed in Windows, macOS and Linux.