mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
175 lines
5.5 KiB
JSON
175 lines
5.5 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2012-4234",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2014-09-04T14:55:09.600",
|
||
|
"lastModified": "2017-08-29T01:32:14.603",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Cross-site scripting (XSS) vulnerability in the group moderation screen in the control center (control.php) in Phorum before 5.2.19 allows remote attackers to inject arbitrary web script or HTML via the group parameter."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Vulnerabilidad de XSS en la pantalla de la moderaci\u00f3n de grupos en el centro de control (control.php) en Phorum anterior a 5.2.19 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del par\u00e1metro group."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "MEDIUM",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "PARTIAL",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 4.3
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 8.6,
|
||
|
"impactScore": 2.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": true
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-79"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phorum:phorum:*:*:*:*:*:*:*:*",
|
||
|
"versionEndIncluding": "5.2.18",
|
||
|
"matchCriteriaId": "B7658DEE-525F-4A02-9577-4830FFE9CB1F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phorum:phorum:5.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A4C4E79D-EBE6-456C-A74F-B94F32736383"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phorum:phorum:5.2.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D3596808-8399-4EA9-B885-5443CA91C3C3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phorum:phorum:5.2.10:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "90FC064F-B462-47F8-880F-CB26A340477E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phorum:phorum:5.2.10:rc1:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D083445E-48ED-4666-98A8-932B01A0F9B2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phorum:phorum:5.2.11:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A79911F1-C1C3-4DD1-BA37-AFC77D7B0D90"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phorum:phorum:5.2.12:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "2200E549-30F8-4803-A570-FBF08B97B7CD"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phorum:phorum:5.2.12:a:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A94B0DAF-C8AC-483F-A280-CCF4B6D17BF0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phorum:phorum:5.2.13:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D9876C40-4537-4622-90D5-175AB59609D4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phorum:phorum:5.2.14:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "51638139-DB4F-4B8C-B125-1FE9AFC86B21"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phorum:phorum:5.2.15:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "6362BDF1-A90C-40A8-A80C-024788426315"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phorum:phorum:5.2.15:a:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "211355E8-5707-4873-AE47-26DFE6061725"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phorum:phorum:5.2.16:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "61C297BC-DF74-42FD-957B-6130AEAA3A04"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0189.html",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Exploit"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://packetstormsecurity.org/files/116057/Phorum-5.2.18-Cross-Site-Scripting.html",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Exploit"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.phorum.org/phorum5/read.php?64,151943",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Patch"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/55275",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Exploit"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78124",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.htbridge.com/advisory/HTB23109",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Exploit"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|