Vulnerability Details : CVE-2013-4092
The SecureSphere Operations Manager (SOM) Management Server in Imperva SecureSphere 9.0.0.5 allows context-dependent attackers to obtain sensitive information by leveraging the presence of (1) a session ID in the jsessionid field to secsphLogin.jsp or (2) credentials in the j_password parameter to j_acegi_security_check, and reading (a) web-server access logs, (b) web-server Referer logs, or (c) the browser history.
Exploit prediction scoring system (EPSS) score for CVE-2013-4092
Probability of exploitation activity in the next 30 days: 0.21%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 59 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-4092
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2013-4092
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-4092
-
http://packetstormsecurity.com/files/121861/Imperva-SecureSphere-Operations-Manager-Command-Execution.html
Imperva SecureSphere Operations Manager Command Execution ≈ Packet Storm
- http://www.digitalsec.net/stuff/explt+advs/Imperva-SecureSphere.OptMgr.txt
Products affected by CVE-2013-4092
- cpe:2.3:a:imperva:securesphere:9.0.0.5:*:*:*:*:*:*:*