<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic cross-site scripting vulnerability. 3com switch 4210 in Security e-Series</title>
    <link>https://community.hpe.com/t5/security-e-series/cross-site-scripting-vulnerability-3com-switch-4210/m-p/2329967#M99</link>
    <description>&lt;P&gt;I have a HP / 3com 4210 18 port&amp;nbsp;switch on my network, which failed PCI compliance due to a cross site scripting vulnerability&amp;nbsp; via the web interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a firmware fix for this? If not, is it possible to disable the web interface or port 80?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions apperciated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
    <pubDate>Mon, 29 Nov 2010 23:32:44 GMT</pubDate>
    <dc:creator>mrussell</dc:creator>
    <dc:date>2010-11-29T23:32:44Z</dc:date>
    <item>
      <title>cross-site scripting vulnerability. 3com switch 4210</title>
      <link>https://community.hpe.com/t5/security-e-series/cross-site-scripting-vulnerability-3com-switch-4210/m-p/2329967#M99</link>
      <description>&lt;P&gt;I have a HP / 3com 4210 18 port&amp;nbsp;switch on my network, which failed PCI compliance due to a cross site scripting vulnerability&amp;nbsp; via the web interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a firmware fix for this? If not, is it possible to disable the web interface or port 80?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions apperciated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2010 23:32:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/cross-site-scripting-vulnerability-3com-switch-4210/m-p/2329967#M99</guid>
      <dc:creator>mrussell</dc:creator>
      <dc:date>2010-11-29T23:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: cross-site scripting vulnerability. 3com switch 4210</title>
      <link>https://community.hpe.com/t5/security-e-series/cross-site-scripting-vulnerability-3com-switch-4210/m-p/2330095#M100</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can restrict access to the web gui via &lt;STRONG&gt;ip http acl &amp;lt;acl&amp;gt;&lt;/STRONG&gt; or disable it with &lt;STRONG&gt;undo ip http&lt;/STRONG&gt; in system-view.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Fredrik&lt;/P&gt;</description>
      <pubDate>Tue, 30 Nov 2010 07:53:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/cross-site-scripting-vulnerability-3com-switch-4210/m-p/2330095#M100</guid>
      <dc:creator>Fredrik Lönnman</dc:creator>
      <dc:date>2010-11-30T07:53:02Z</dc:date>
    </item>
    <item>
      <title>Re: cross-site scripting vulnerability. 3com switch 4210</title>
      <link>https://community.hpe.com/t5/security-e-series/cross-site-scripting-vulnerability-3com-switch-4210/m-p/2330237#M101</link>
      <description>&lt;P&gt;Thanks Fredrik, that's exactly what i was loking for. I connected via CLI, went to system-view and entered undo ip http shutdown, and it disabled the web service.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Nov 2010 18:30:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/cross-site-scripting-vulnerability-3com-switch-4210/m-p/2330237#M101</guid>
      <dc:creator>mrussell</dc:creator>
      <dc:date>2010-11-30T18:30:07Z</dc:date>
    </item>
  </channel>
</rss>

