231 lines
8.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2008-4456",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-10-06T23:25:50.707",
"lastModified": "2019-12-17T19:56:39.450",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document. NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el cliente command-line en MySQL v5.0.26 a la v5.0.45, cuando la opci\u00f3n --html est\u00e1 activa, permite a los atacantes inyectar web script o HTML de su elecci\u00f3n coloc\u00e1ndolo en una celda de la base de datos, a la que puede acceder el cliente al comoponer un documento HTML."
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-4456\n\nThis issue was addressed for Red Hat Enterprise Linux 5 by https://rhn.redhat.com/errata/RHSA-2009-1289.html and Red Hat Enterprise Linux 4 by https://rhn.redhat.com/errata/RHSA-2010-0110.html .\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, future MySQL package updates may address this flaw for Red Hat Enterprise Linux 3, and Red Hat Application Stack 2.",
"lastModified": "2010-02-17T00:00:00"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 2.6
},
"baseSeverity": "LOW",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
"matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
"matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
"matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
"matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
"matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
"matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
"matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
"matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25"
}
]
}
]
}
],
"references": [
{
"url": "http://bugs.mysql.com/bug.php?id=27884",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/bugtraq/2008/Oct/0026.html",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/4357",
"source": "cve@mitre.org"
},
{
"url": "http://support.apple.com/kb/HT4077",
"source": "cve@mitre.org"
},
{
"url": "http://ubuntu.com/usn/usn-897-1",
"source": "cve@mitre.org"
},
{
"url": "http://www.debian.org/security/2009/dsa-1783",
"source": "cve@mitre.org"
},
{
"url": "http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability",
"source": "cve@mitre.org"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/496842/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/496877/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/497158/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/497885/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/31486",
"source": "cve@mitre.org"
},
{
"url": "http://www.ubuntu.com/usn/USN-1397-1",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45590",
"source": "cve@mitre.org"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11456",
"source": "cve@mitre.org"
}
]
}