{ "id": "CVE-2007-4488", "sourceIdentifier": "cve@mitre.org", "published": "2007-08-22T23:17:00.000", "lastModified": "2024-11-21T00:35:42.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Siemens Gigaset SE361 WLAN router with firmware 1.00.0 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI immediately following the filename for (1) a GIF filename, which triggers display of the GIF file in text format and an unspecified denial of service (crash); or (2) the login.tri filename, which triggers a continuous loop of the browser attempting to visit the login page." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en el enrutador Siemens Gigaset SE361 WLAN con firmware 1.00.0 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante un trozo de URI que sigue inmediatamente a un nombre de fichero para (1) un nombre de fichero GIF, lo cual provoca que se muestre el fichero GIF en formato de texto una denegaci\u00f3n de servicio no especificada (ca\u00edda); o (2) el nombre de fichero login.tri, lo cual provoca bucle infinito del navegador intentando visitar la p\u00e1gina de inicio de sesi\u00f3n." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:h:siemens:gigaset_se361_wlan_router:0:firmware_1.00:*:*:*:*:*:*", "matchCriteriaId": "A818263C-EC62-438D-A6B2-AEBEAF5E65F2" } ] } ] } ], "references": [ { "url": "http://osvdb.org/45841", "source": "cve@mitre.org" }, { "url": "http://osvdb.org/45842", "source": "cve@mitre.org" }, { "url": "http://securityreason.com/securityalert/3050", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/archive/1/477220/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://osvdb.org/45841", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://osvdb.org/45842", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://securityreason.com/securityalert/3050", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/477220/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }