Vulnerability Description
The Getahead Direct Web Remoting (DWR) framework 1.1.4 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Getahead | Direct Web Remoting | 1.1.4 |
References
- http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
- http://osvdb.org/43322
- http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdfURL Repurposed
- http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
- http://osvdb.org/43322
- http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdfURL Repurposed
FAQ
What is CVE-2007-2377?
CVE-2007-2377 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The Getahead Direct Web Remoting (DWR) framework 1.1.4 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data ...
How severe is CVE-2007-2377?
CVE-2007-2377 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2377?
Check the references section above for vendor advisories and patch information. Affected products include: Getahead Direct Web Remoting.