mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 09:41:31 +00:00
143 lines
4.5 KiB
JSON
143 lines
4.5 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2009-2119",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2009-06-18T21:30:00.407",
|
||
|
"lastModified": "2018-10-10T19:39:18.647",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Cross-site scripting (XSS) vulnerability in the login interface (my.logon.php3) in F5 FirePass SSL VPN 5.5 through 5.5.2 and 6.0 through 6.0.3 allows remote attackers to inject arbitrary web script or HTML via a base64-encoded xcho parameter."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos cruzados(XSS) en el interface de autenticaci\u00f3n de F5 FirePass SSL VPN v5.5 hasta v5.5.2 y 6.0 hasta v6.0.3 , permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de un campo password manipulado. NOTA: algunos de estos detalles se han obtenido de terceros."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "MEDIUM",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "PARTIAL",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 4.3
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 8.6,
|
||
|
"impactScore": 2.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": true
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-79"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:h:f5:firepass_ssl_vpn:5.5:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7C2AE5BB-5D4B-4CA3-BB28-2BE9A4974CE2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:h:f5:firepass_ssl_vpn:5.5.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B7ABAF45-EB5E-44C9-AF4D-EDF741BABCE5"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:h:f5:firepass_ssl_vpn:5.5.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "4976941E-BDAA-4AD2-AB70-7B4A2E134246"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:h:f5:firepass_ssl_vpn:6.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "01AFA837-B856-482A-8192-5E92FD40EA65"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:h:f5:firepass_ssl_vpn:6.0.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D7AA0609-9A3B-4C83-8DE6-2589152F8CF6"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:h:f5:firepass_ssl_vpn:6.0.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7093053B-97DB-4B45-9E36-5A52A28CDCE1"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:h:f5:firepass_ssl_vpn:6.0.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "8BA897F6-03C3-4182-B288-6F9C1337C10E"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/archive/1/504232/100/0/threaded",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/35312",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securitytracker.com/id?1022387",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Patch"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.vupen.com/english/advisories/2009/1570",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Patch",
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51064",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.fox-it.com/nl/nieuws-en-events/nieuws/laatste-nieuws/nieuwsartikel/f5-firepass-cross-site-scripting-vulnerability/106",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.fox-it.com/uploads/pdf/advisory_xss_f5_firepass.pdf",
|
||
|
"source": "cve@mitre.org"
|
||
|
}
|
||
|
]
|
||
|
}
|