mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-28 09:12:00 +00:00
102 lines
3.7 KiB
JSON
102 lines
3.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"ID": "CVE-2011-4958",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the process function in SSViewer.php in SilverStripe before 2.3.13 and 2.4.x before 2.4.6 allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING to template placeholders, as demonstrated by a request to (1) admin/reports/, (2) admin/comments/, (3) admin/, (4) admin/show/, (5) admin/assets/, and (6) admin/security/."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "20111008 SilverStripe 2.4.5 Multiple backend Cross-site scripting vulnerabilities",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/520050/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "http://doc.silverstripe.org/sapphire/en/trunk/changelogs/2.4.6",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://doc.silverstripe.org/sapphire/en/trunk/changelogs/2.4.6"
|
|
},
|
|
{
|
|
"name": "http://doc.silverstripe.org/sapphire/en/trunk/changelogs/2.3.12",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://doc.silverstripe.org/sapphire/en/trunk/changelogs/2.3.12"
|
|
},
|
|
{
|
|
"name": "76258",
|
|
"refsource": "OSVDB",
|
|
"url": "http://osvdb.org/76258"
|
|
},
|
|
{
|
|
"name": "https://github.com/silverstripe/sapphire/commit/bdd6391",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/silverstripe/sapphire/commit/bdd6391"
|
|
},
|
|
{
|
|
"name": "46390",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/46390"
|
|
},
|
|
{
|
|
"name": "https://github.com/silverstripe/sapphire/commit/52a895f",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/silverstripe/sapphire/commit/52a895f"
|
|
},
|
|
{
|
|
"name": "https://github.com/silverstripe/sapphire/commit/16c3235",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/silverstripe/sapphire/commit/16c3235"
|
|
},
|
|
{
|
|
"name": "http://www.rul3z.de/advisories/SSCHADV2011-024.txt",
|
|
"refsource": "MISC",
|
|
"url": "http://www.rul3z.de/advisories/SSCHADV2011-024.txt"
|
|
}
|
|
]
|
|
}
|
|
} |