mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 09:41:31 +00:00
127 lines
4.0 KiB
JSON
127 lines
4.0 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2009-0038",
|
||
|
"sourceIdentifier": "secalert@redhat.com",
|
||
|
"published": "2009-04-17T14:30:00.530",
|
||
|
"lastModified": "2018-10-11T20:59:19.073",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) ip, (3) username, or (4) description parameter to console/portal/Server/Monitoring; or (5) the PATH_INFO to the default URI under console/portal/."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en la consola de administraci\u00f3n web en Apache Geronimo Application Server 2.1 a 2.1.3 permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante los par\u00e1metros (1) name, (2) ip, (3) username, o (4) description para console/portal/Server/Monitoring; o (5) el PATH_INFO para la URI por defecto bajo console/portal/."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "MEDIUM",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "PARTIAL",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 4.3
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 8.6,
|
||
|
"impactScore": 2.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": true
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-79"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:apache:geronimo:2.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "ECF8E5A6-BCAA-428E-A703-6D1508AE2DA0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:apache:geronimo:2.1.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7353F7C5-18E8-4310-B31E-9B13963E3F18"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:apache:geronimo:2.1.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "73F4CBB7-FF16-4B01-85B2-5B3FE7C8BE3D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:apache:geronimo:2.1.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "366DB1DC-39E2-43A1-9A23-37B7A75F7D07"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://dsecrg.com/pages/vul/show.php?id=119",
|
||
|
"source": "secalert@redhat.com",
|
||
|
"tags": [
|
||
|
"Exploit"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214",
|
||
|
"source": "secalert@redhat.com",
|
||
|
"tags": [
|
||
|
"Patch",
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://issues.apache.org/jira/browse/GERONIMO-4597",
|
||
|
"source": "secalert@redhat.com",
|
||
|
"tags": [
|
||
|
"Patch"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/archive/1/502734/100/0/threaded",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/34562",
|
||
|
"source": "secalert@redhat.com",
|
||
|
"tags": [
|
||
|
"Exploit"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.vupen.com/english/advisories/2009/1089",
|
||
|
"source": "secalert@redhat.com"
|
||
|
}
|
||
|
]
|
||
|
}
|