search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Google Search Appliance dynamic navigation cross-site scripting vulnerability

Vulnerability Note VU#673313

Original Release Date: 2014-05-01 | Last Revised: 2014-05-01

Overview

Google Search Appliance (GSA) devices contain a cross-site scripting (XSS) vulnerability when dynamic navigation is enabled.

Description

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Google Search Appliance versions earlier than 7.2.0.G.114 and 7.0.14.G.216 fail to properly sanitize user input that is reflected directly into a JavaScript <script> block if the dynamic navigation feature is enabled. This allows an attacker to perform a reflected XSS attack.

Impact

A remote unauthenticated attacker may be able to execute arbitrary script in the context of the end-user's browser session.

Solution

Apply an update

This issue is resolved in GSA versions 7.2.0.G.114 and 7.0.14.G.216. These updates are available in the Google Enterprise Support Portal.

Disable dynamic navigation

This vulnerability can be mitigated by disabling the dynamic navigation feature in the GSA.

Vendor Information

673313
 

Google Affected

Notified:  March 20, 2014 Updated: May 01, 2014

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Addendum

This issue is resolved in GSA versions 7.2.0.G.114 and 7.0.14.G.216. These updates are available in the Google Enterprise Support Portal.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base 4.3 AV:N/AC:M/Au:N/C:P/I:N/A:N
Temporal 3.4 E:POC/RL:OF/RC:C
Environmental 3.4 CDP:ND/TD:H/CR:ND/IR:ND/AR:ND

References

Acknowledgements

This vulnerability was reported by Will Dormann of the CERT/CC.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2014-0362
Date Public: 2014-05-01
Date First Published: 2014-05-01
Date Last Updated: 2014-05-01 18:23 UTC
Document Revision: 23

Sponsored by CISA.