mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-30 18:04:30 +00:00
78 lines
2.6 KiB
JSON
78 lines
2.6 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2017-20033",
|
|
"TITLE": "PHPList Reflected cross site scriting",
|
|
"REQUESTER": "cna@vuldb.com",
|
|
"ASSIGNER": "cna@vuldb.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"generator": "vuldb.com",
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "PHPList",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "3.2.6"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-80 Basic Cross Site Scripting"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability classified as problematic has been found in PHPList 3.2.6. This affects an unknown part of the file /lists/admin/. The manipulation of the argument page with the input send\\'\\\";><script>alert(8)</script> leads to cross site scripting (Reflected). It is possible to initiate the attack remotely. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component."
|
|
}
|
|
]
|
|
},
|
|
"credit": "Tim Coen",
|
|
"impact": {
|
|
"cvss": {
|
|
"version": "3.1",
|
|
"baseScore": "4.3",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2017/Mar/46",
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2017/Mar/46"
|
|
},
|
|
{
|
|
"url": "https://vuldb.com/?id.98919",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?id.98919"
|
|
}
|
|
]
|
|
}
|
|
} |