134 lines
3.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2013-4171",
"sourceIdentifier": "secalert@redhat.com",
"published": "2013-12-07T20:55:02.210",
"lastModified": "2025-04-11T00:51:21.963",
"vulnStatus": "Deferred",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Roller before 5.0.2 allow remote attackers to inject arbitrary web script or HTML via vectors related to the search results in the (1) RSS and (2) Atom feed templates."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades XSS en Apache Roller anterior a v5.0.2 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores relacionados con los resultados de b\u00fasqueda en las plantillas feed (1) RSS y (2) Atom."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
2023-04-24 12:24:31 +02:00
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:roller:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.0.1",
"matchCriteriaId": "4EE5876E-60B5-4C9B-AC41-E45F47F66FC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:roller:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BB9B4815-4B5F-488A-B498-1065E74ECA05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:roller:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "558E1D25-794A-49EF-AEEA-35B0A697634D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:roller:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E2628B6C-451D-49BA-B9A5-528A4A8C8FA7"
}
]
}
]
}
],
"references": [
{
"url": "http://rollerweblogger.org/project/entry/apache_roller_5_0_2",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://secunia.com/advisories/55862",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/55877",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://rollerweblogger.org/project/entry/apache_roller_5_0_2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://secunia.com/advisories/55862",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/55877",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}