Published:2007/06/07  Last Updated:2008/05/21

JVN#23891849
ADPLAN cross-site scripting vulnerability

Overview

ADPLAN Version 3, web access measurement software provided by Opt, Inc., contains a cross-site scripting vulnerability in the SEO (search engine optimization) module.

Products Affected

ADPLAN Version 3's SEO module

Description

ADPLAN Version 3, web access measurement software provided by Opt, Inc., contains a cross-site scripting vulnerability in the SEO (search engine optimization) module.
A website that employs ADPLAN Version 3 service generates a web page using the HTTP header information sent from a client web browser.
However, as the HTTP header information sent from a user's web browser is not handled correctly by ADPLAN Version 3, an arbitrary script could be executed on the user's web browser if the user is forced to visit a site using ADPLAN service through an attack.

Impact

An arbitrary script may be executed on the user's web browser.

Solution

Update the Software
We recommend users upgrade to the latest version of the software provided by the vendor.

Vendor Status

Vendor Link
OPT, Inc. ADPLAN

References

JPCERT/CC Addendum

This module is only distributed to users of ADPLAN Version 3's SEO service.
Opt, Inc. is privately contacting customers with the availability of a fixed version of the module.
This vulnerability does not exist in ADPLAN Version 4.

Vulnerability Analysis by JPCERT/CC

Analyzed on 2007.06.06

Measures Conditions Severity
Access Required Routed - can be attacked over the Internet using packets
  • High
Authentication None - anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file
  • Medium
Exploit Complexity Low-Medium - some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls)
  • Medium-High

Description of each analysis measures

Credit

Toshiharu Sugiyama reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE
JVN iPedia JVNDB-2007-000434

Update History