cvelist/2019/7xxx/CVE-2019-7551.json
2019-04-10 17:00:40 +00:00

77 lines
2.7 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-7551",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cantemo Portal before 3.2.13, 3.3.x before 3.3.8, and 3.4.x before 3.4.9 has XSS. Leveraging this vulnerability would enable performing actions as users, including administrative users. This could enable account creation and deletion as well as deletion of information contained within the app."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.bishopfox.com/news/2019/03/cantemo-portal-version-3-8-4-cross-site-scripting/",
"refsource": "MISC",
"name": "https://www.bishopfox.com/news/2019/03/cantemo-portal-version-3-8-4-cross-site-scripting/"
},
{
"url": "https://www.bishopfox.com/blog/news-category/advisories/",
"refsource": "MISC",
"name": "https://www.bishopfox.com/blog/news-category/advisories/"
},
{
"refsource": "CONFIRM",
"name": "https://doc.cantemo.com/latest/ReleaseNotes/intro.html#version-3-4-9",
"url": "https://doc.cantemo.com/latest/ReleaseNotes/intro.html#version-3-4-9"
},
{
"refsource": "CONFIRM",
"name": "https://blog-posts--cantemo.netlify.com/news/2019/03/cantemo-portal-xss-vulnerabilities/",
"url": "https://blog-posts--cantemo.netlify.com/news/2019/03/cantemo-portal-xss-vulnerabilities/"
}
]
}
}