cvelist/2018/5xxx/CVE-2018-5249.json

72 lines
2.3 KiB
JSON
Raw Normal View History

2018-01-05 14:03:09 -05:00
{
2019-03-17 23:41:40 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-5249",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2018-01-05 15:07:31 -05:00
{
2019-03-17 23:41:40 +00:00
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Shaarli before 0.8.5 and 0.9.x before 0.9.3 allows remote attackers to inject arbitrary code via the login form's username field (aka the login parameter to the ban_canLogin function in index.php)."
2018-01-05 15:07:31 -05:00
}
2019-03-17 23:41:40 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/shaarli/Shaarli/releases/tag/v0.8.5",
"refsource": "CONFIRM",
"url": "https://github.com/shaarli/Shaarli/releases/tag/v0.8.5"
},
{
"name": "https://github.com/shaarli/Shaarli/pull/1046",
"refsource": "CONFIRM",
"url": "https://github.com/shaarli/Shaarli/pull/1046"
},
{
"name": "https://github.com/shaarli/Shaarli/releases/tag/v0.9.3",
"refsource": "CONFIRM",
"url": "https://github.com/shaarli/Shaarli/releases/tag/v0.9.3"
}
]
}
}