CVE-2012-3790
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
20/06/2012
Last modified:
11/04/2025
Description
Cross-site scripting (XSS) vulnerability in index.php in Adiscon LogAnalyzer before 3.4.4 and 3.5.x before 3.5.5 allows remote attackers to inject arbitrary web script or HTML via the highlight parameter in a Search action.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:adiscon:loganalyzer:*:*:*:*:*:*:*:* | 3.4.3 (including) | |
| cpe:2.3:a:adiscon:loganalyzer:3.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adiscon:loganalyzer:3.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adiscon:loganalyzer:3.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adiscon:loganalyzer:3.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adiscon:loganalyzer:3.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adiscon:loganalyzer:3.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adiscon:loganalyzer:3.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adiscon:loganalyzer:3.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adiscon:loganalyzer:3.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adiscon:loganalyzer:3.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adiscon:loganalyzer:3.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adiscon:loganalyzer:3.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adiscon:loganalyzer:3.5.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://loganalyzer.adiscon.com/downloads/loganalyzer-3-4-4-v3-stable
- http://loganalyzer.adiscon.com/downloads/loganalyzer-v3-5-5-v3-beta
- http://loganalyzer.adiscon.com/security-advisories/loganalyzer-cross-site-scripting-vulnerability-in-highlight-parameter
- http://secpod.org/advisories/SecPod_LogAnalyzer_XSS_Vuln.txt
- http://secpod.org/blog/?p=504
- http://loganalyzer.adiscon.com/downloads/loganalyzer-3-4-4-v3-stable
- http://loganalyzer.adiscon.com/downloads/loganalyzer-v3-5-5-v3-beta
- http://loganalyzer.adiscon.com/security-advisories/loganalyzer-cross-site-scripting-vulnerability-in-highlight-parameter
- http://secpod.org/advisories/SecPod_LogAnalyzer_XSS_Vuln.txt
- http://secpod.org/blog/?p=504



