A vulnerability in Hitachi Command Suite prior to 8.6.2-00, Hitachi Automation Director prior to 8.6.2-00 and Hitachi Infrastructure Analytics Advisor prior to 4.2.0-00 allow authenticated remote users to load an arbitrary Cascading Style Sheets (CSS) token sequence. Hitachi Command Suite includes Hitachi Device Manager, Hitachi Tiered Storage Manager, Hitachi Replication Manager, Hitachi Tuning Manager, Hitachi Global Link Manager and Hitachi Compute Systems Manager.
References
Link | Resource |
---|---|
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/ | Vendor Advisory |
https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2019-128/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
No history.
Information
Published : 2020-02-14 16:15
Updated : 2024-02-04 20:39
NVD link : CVE-2018-21033
Mitre link : CVE-2018-21033
CVE.ORG link : CVE-2018-21033
JSON object : View
Products Affected
microsoft
- windows
hitachi
- device_manager
- replication_manager
- global_link_manager
- infrastructure_analytics_advisor
- compute_systems_manager
- tuning_manager
- tiered_storage_manager
- automation_director
linux
- linux_kernel
oracle
- solaris
CWE
CWE-20
Improper Input Validation