cvelist/2017/20xxx/CVE-2017-20122.json
2022-06-30 06:00:47 +00:00

77 lines
2.6 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-20122",
"TITLE": "Bitrix Site Manager Contact Form cross site scripting",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Bitrix",
"product": {
"product_data": [
{
"product_name": "Site Manager",
"version": {
"version_data": [
{
"version_value": "12.06.2015"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-80 Basic Cross Site Scripting"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability classified as problematic was found in Bitrix Site Manager 12.06.2015. Affected by this vulnerability is an unknown functionality of the component Contact Form. The manipulation of the argument text with the input <img src=\"http://1\"; on onerror=\"$(\u2019p').text(\u2019Hacked\u2019)\" /> leads to basic cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "3.5",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
}
},
"references": {
"reference_data": [
{
"url": "http://seclists.org/fulldisclosure/2017/Feb/3",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2017/Feb/3"
},
{
"url": "https://vuldb.com/?id.96643",
"refsource": "MISC",
"name": "https://vuldb.com/?id.96643"
}
]
}
}