mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
113 lines
4.5 KiB
JSON
113 lines
4.5 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-26091",
|
|
"ASSIGNER": "psirt@adobe.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser session. Exploitation of this issue typically requires user interaction, such as convincing a victim to click on a specially crafted link or to submit a form that causes the vulnerable script to execute."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Cross-site Scripting (DOM-based XSS) (CWE-79)",
|
|
"cweId": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Adobe",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Adobe Experience Manager",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"versions": [
|
|
{
|
|
"lessThanOrEqual": "6.5.20",
|
|
"status": "affected",
|
|
"version": "0",
|
|
"versionType": "semver"
|
|
}
|
|
],
|
|
"defaultStatus": "affected"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
|
"refsource": "MISC",
|
|
"name": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"discovery": "EXTERNAL"
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"availabilityRequirement": "NOT_DEFINED",
|
|
"baseScore": 5.4,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "LOW",
|
|
"confidentialityRequirement": "NOT_DEFINED",
|
|
"environmentalScore": 5.4,
|
|
"environmentalSeverity": "MEDIUM",
|
|
"exploitCodeMaturity": "NOT_DEFINED",
|
|
"integrityImpact": "LOW",
|
|
"integrityRequirement": "NOT_DEFINED",
|
|
"modifiedAttackComplexity": "LOW",
|
|
"modifiedAttackVector": "NETWORK",
|
|
"modifiedAvailabilityImpact": "NONE",
|
|
"modifiedConfidentialityImpact": "LOW",
|
|
"modifiedIntegrityImpact": "LOW",
|
|
"modifiedPrivilegesRequired": "NONE",
|
|
"modifiedScope": "UNCHANGED",
|
|
"modifiedUserInteraction": "REQUIRED",
|
|
"privilegesRequired": "NONE",
|
|
"remediationLevel": "NOT_DEFINED",
|
|
"reportConfidence": "NOT_DEFINED",
|
|
"scope": "UNCHANGED",
|
|
"temporalScore": 5.4,
|
|
"temporalSeverity": "MEDIUM",
|
|
"userInteraction": "REQUIRED",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |