2023-09-25 18:00:31 +00:00
{
"id" : "CVE-2023-4892" ,
"sourceIdentifier" : "help@fluidattacks.com" ,
"published" : "2023-09-25T16:15:15.530" ,
2023-09-26 20:00:29 +00:00
"lastModified" : "2023-09-26T18:59:31.087" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-09-25 18:00:31 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Teedy v1.11 has a vulnerability in its text editor that allows events\n\nto be executed in HTML tags that an attacker could manipulate. Thanks\n\nto this, it is possible to execute malicious JavaScript in the webapp.\n\n\n\n"
2023-09-26 20:00:29 +00:00
} ,
{
"lang" : "es" ,
"value" : "Teedy v1.11 tiene una vulnerabilidad en su editor de texto que permite ejecutar eventos en etiquetas HTML que un atacante podr\u00eda manipular. Gracias a esto, es posible ejecutar JavaScript malicioso en la aplicaci\u00f3n web.\n"
2023-09-25 18:00:31 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-09-26 20:00:29 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4.6 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.1 ,
"impactScore" : 2.5
} ,
2023-09-25 18:00:31 +00:00
{
"source" : "help@fluidattacks.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 5.7 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.1 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
2023-09-26 20:00:29 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
} ,
2023-09-25 18:00:31 +00:00
{
"source" : "help@fluidattacks.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
2023-09-26 20:00:29 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sismics:teedy:1.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AB7008DF-9901-48D2-9079-D4F89F4E810E"
}
]
}
]
}
] ,
2023-09-25 18:00:31 +00:00
"references" : [
{
"url" : "https://fluidattacks.com/advisories/freebird" ,
2023-09-26 20:00:29 +00:00
"source" : "help@fluidattacks.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2023-09-25 18:00:31 +00:00
} ,
{
"url" : "https://teedy.io" ,
2023-09-26 20:00:29 +00:00
"source" : "help@fluidattacks.com" ,
"tags" : [
"Product"
]
2023-09-25 18:00:31 +00:00
}
]
}