130 lines
3.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2008-1974",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-04-27T19:05:00.000",
"lastModified": "2018-10-11T20:38:36.903",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in addevent.php in Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, and Groupware 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the url parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencias de \u00f3rdenes en sitios cruzados (XSS) en addevent.php de Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, y Groupware 1.0.5 permite a atacantes remotos inyectar 'script' web o HTML de su elecci\u00f3n mediante el par\u00e1metro \"url\"."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B3AB0176-9CB3-4D49-B644-2C413C9B6E13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "842159D1-E30C-4077-8E92-07979E52C10B"
}
]
}
]
}
],
"references": [
{
"url": "http://forum.aria-security.com/showthread.php?t=49",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/3831",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/491230/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/28898",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securitytracker.com/id?1019934",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1373/references",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41974",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2008/dsa-1560",
"source": "cve@mitre.org"
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html",
"source": "cve@mitre.org"
}
]
}