2023-12-15 11:00:27 +00:00
{
"id" : "CVE-2023-6838" ,
"sourceIdentifier" : "ed10eef1-636d-4fbe-9993-6890dfa878f8" ,
"published" : "2023-12-15T10:15:10.000" ,
2023-12-19 15:00:28 +00:00
"lastModified" : "2023-12-19T13:42:11.677" ,
"vulnStatus" : "Analyzed" ,
2023-12-15 11:00:27 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Reflected XSS vulnerability can be exploited by tampering a request parameter in Authentication Endpoint. This can be performed in both authenticated and unauthenticated requests.\n\n"
2023-12-15 15:00:30 +00:00
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad XSS reflejada se puede explotar alterando un par\u00e1metro de solicitud en el endpoint de autenticaci\u00f3n. Esto se puede realizar tanto en solicitudes autenticadas como no autenticadas."
2023-12-15 11:00:27 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-12-19 15:00:28 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 6.1 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 2.7
} ,
2023-12-15 11:00:27 +00:00
{
"source" : "ed10eef1-636d-4fbe-9993-6890dfa878f8" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 6.1 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 2.7
}
]
} ,
"weaknesses" : [
2023-12-19 15:00:28 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
} ,
2023-12-15 11:00:27 +00:00
{
"source" : "ed10eef1-636d-4fbe-9993-6890dfa878f8" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
2023-12-19 15:00:28 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wso2:api_manager:3.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1344FB79-0796-445C-A8F3-C03E995925D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wso2:api_manager:3.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E31E32CD-497E-4EF5-B3FC-8718EE06EDAD"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wso2:identity_server_as_key_manager:5.10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6BB34405-A2F1-461A-B51B-E103BB3680A1"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wso2:identity_server:5.10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4F126CA-A2F9-44F4-968B-DF71765869E5"
}
]
}
]
}
] ,
2023-12-15 11:00:27 +00:00
"references" : [
{
"url" : "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1233/" ,
2023-12-19 15:00:28 +00:00
"source" : "ed10eef1-636d-4fbe-9993-6890dfa878f8" ,
"tags" : [
"Vendor Advisory"
]
2023-12-15 11:00:27 +00:00
}
]
}