CVE-2007-2377

medium

Description

The Getahead Direct Web Remoting (DWR) framework 1.1.4 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."

References

http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf

http://osvdb.org/43322

http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html

Details

Source: Mitre, NVD

Published: 2007-04-30

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Severity: Medium