mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
68 lines
2.2 KiB
JSON
68 lines
2.2 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security_alert@emc.com",
|
|
"DATE_PUBLIC": "2018-03-16T00:00:00",
|
|
"ID": "CVE-2018-1229",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Spring Batch Admin",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Spring by Pivotal"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Pivotal Spring Batch Admin, all versions, contains a stored XSS vulnerability in the file upload feature. An unauthenticated malicious user with network access to Spring Batch Admin could store an arbitrary web script that would be executed by other users. This issue has not been patched because Spring Batch Admin has reached end of life."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-79 - Cross-site Scripting (XSS) - Stored"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "103462",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/103462"
|
|
},
|
|
{
|
|
"name": "https://pivotal.io/security/cve-2018-1229",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://pivotal.io/security/cve-2018-1229"
|
|
}
|
|
]
|
|
}
|
|
} |