mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
113 lines
4.6 KiB
JSON
113 lines
4.6 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-52823",
|
|
"ASSIGNER": "psirt@adobe.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Adobe Experience Manager versions 6.5.21 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by an attacker to execute arbitrary code in the context of the victim's browser session. By manipulating a DOM element through a crafted URL or user input, the attacker can inject malicious scripts that run when the page is rendered. This type of attack requires user interaction, as the victim would need to visit a malicious link or input data into a compromised form."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Cross-site Scripting (DOM-based XSS) (CWE-79)",
|
|
"cweId": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Adobe",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Adobe Experience Manager",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"versions": [
|
|
{
|
|
"lessThanOrEqual": "6.5.21",
|
|
"status": "affected",
|
|
"version": "0",
|
|
"versionType": "semver"
|
|
}
|
|
],
|
|
"defaultStatus": "affected"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html",
|
|
"refsource": "MISC",
|
|
"name": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"discovery": "EXTERNAL"
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"availabilityRequirement": "NOT_DEFINED",
|
|
"baseScore": 5.4,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "LOW",
|
|
"confidentialityRequirement": "NOT_DEFINED",
|
|
"environmentalScore": 5.4,
|
|
"environmentalSeverity": "MEDIUM",
|
|
"exploitCodeMaturity": "NOT_DEFINED",
|
|
"integrityImpact": "LOW",
|
|
"integrityRequirement": "NOT_DEFINED",
|
|
"modifiedAttackComplexity": "LOW",
|
|
"modifiedAttackVector": "NETWORK",
|
|
"modifiedAvailabilityImpact": "NONE",
|
|
"modifiedConfidentialityImpact": "LOW",
|
|
"modifiedIntegrityImpact": "LOW",
|
|
"modifiedPrivilegesRequired": "LOW",
|
|
"modifiedScope": "CHANGED",
|
|
"modifiedUserInteraction": "REQUIRED",
|
|
"privilegesRequired": "LOW",
|
|
"remediationLevel": "NOT_DEFINED",
|
|
"reportConfidence": "NOT_DEFINED",
|
|
"scope": "CHANGED",
|
|
"temporalScore": 5.4,
|
|
"temporalSeverity": "MEDIUM",
|
|
"userInteraction": "REQUIRED",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |