Skip to main content

Hitachi

Software Vulnerability Information

Update: May 14, 2014

When the DirectoryIndex function is being used, malicious scripts can be executed on a client web browser. Please note that this vulnerability corresponds to CVE-2007-4465.

Vulnerability ID

HS07-041

Vulnerability description

When the DirectoryIndex function in Hitachi Web Server is being used and a request that includes a malicious script is received, that malicious script can be added to Web pages generated by Hitachi Web Server, and executed on a client web browser.

Malicious remote users can exploit this vulnerability to execute malicious scripts. Affected products and versions are listed below. Please upgrade to the appropriate version.

Affected products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the affected product.

Version:

Platform
Gives the affected version.

Product name: Hitachi Web Server

Version(s):

HP-UX 11.00 or later
03-00
HP-UX(IPF)
03-00
Solaris
03-00
Linux
03-00 to 03-00-01, 03-10
Linux(IPF)
03-00 to 03-00-01
AIX
03-00 to 03-00-01, 03-10

Please note that this vulnerability also affects Cosminexus products that bundle Hitachi Web Server. For details about Cosminexus products, contact your Hitachi support service representative.

- Cosminexus V7

Product name: uCosminexus Application Server Enterprise
Product name: uCosminexus Application Server Standard

Version(s):

HP-UX
07-10 to 07-10-01
HP-UX(IPF)
07-00, 07-10 to 07-10-01
Solaris
07-00 to 07-00-01, 07-10
Linux
07-00 to 07-00-01, 07-10, 07-50 to 07-50-01
Linux(IPF)
07-10 to 07-10-01
AIX
07-00, 07-10, 07-50 to 07-50-01

Product name: uCosminexus Service Platform

Version(s):

Linux
07-00, 07-10, 07-50

Fixed products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the fixed product.

Version:

Platform
Gives the fixed version, and release date.

Scheduled version:

Platform
Gives the fixed version scheduled to be released.

Product name: Hitachi Web Server

Version(s):

HP-UX 11.00 or later
03-00-01 November 16, 2007
HP-UX(IPF)
03-00-01 November 13, 2007
Solaris
03-00-01 November 21, 2007
Linux
03-00-06 March 9, 2011
03-10-04 September 14, 2009
Linux(IPF)
03-00-06 April 15, 2011
AIX
03-00-05 June 29, 2010
03-10-09 February 23, 2011

For details on the fixed products, contact your Hitachi support service representative.

Revision history

May 14, 2014
Information about CVE number is added.
April 26, 2011
Information about fixed versions is updated.
March 23, 2011
Information about fixed versions is updated.
February 28, 2011
Information about fixed versions is updated.
July 12, 2010
Information about fixed versions is updated.
December 13, 2007
This page is released.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.