mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 17:51:17 +00:00
174 lines
6.3 KiB
JSON
174 lines
6.3 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2009-2352",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2009-07-07T23:30:00.280",
|
||
|
"lastModified": "2018-10-10T19:39:48.617",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Google Chrome 1.0.154.48 and earlier does not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header, a related issue to CVE-2009-1312. NOTE: it was later reported that 2.0.172.28, 2.0.172.37, and 3.0.193.2 Beta are also affected."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Chrome de Google versiones 1.0.154.48 y anteriores, no bloquea los URI javascript: en encabezados Refresh en respuestas HTTP, que permite a los atacantes remotos conducir ataques de tipo cross-site scripting (XSS) por medio de vectores relacionados con (1) inyectar un encabezado Refresh o ( 2) especificar el contenido de un encabezado Refresh, este es un problema relacionado con el CVE-2009-1312. NOTA: m\u00e1s tarde se report\u00f3 que las versiones 2.0.172.28, 2.0.172.37 y 3.0.193.2 Beta tambi\u00e9n est\u00e1n afectadas."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "MEDIUM",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "PARTIAL",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 4.3
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 8.6,
|
||
|
"impactScore": 2.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": true
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-79"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||
|
"versionEndIncluding": "1.0.154.48",
|
||
|
"matchCriteriaId": "4E9FA397-22DD-448C-8CC5-93549EAD7738"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5B8FF77A-7802-4963-B532-3F16C7BB012C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D73576CF-76EE-42A3-9955-D7991384B8C1"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DD4A2AB1-6F90-4D0B-A673-C6310514CE63"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "66A4FEB5-11D8-4FFC-972D-A3B991176040"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A6313614-FC3C-488C-B80B-191797319A56"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "9CDF3DAB-73C4-48E8-9B0B-DADABF217555"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7B2FAE50-4CA3-46F6-B533-C599011A9ED5"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B0D94F22-37B6-4938-966A-E1830D83FBC3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D8B7164E-7A4F-4959-9E6D-EF614EDD4C3C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0C0F9D75-B10D-468F-84D8-61B6A1230556"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5D2CAE29-3F1E-4374-B82C-B60B7BB4AEAE"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "173D539E-045E-4429-80C9-5749BECC6CD5"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D2052352-FECC-4990-B0F4-A715694AD816"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "BCBC80CB-4AB8-4EDF-9940-D2D7124D7549"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E37938BB-8368-46D6-A8E4-F99F5CB9B82E"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://websecurity.com.ua/3275/",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://websecurity.com.ua/3386/",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/archive/1/504718/100/0/threaded",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/archive/1/504723/100/0/threaded",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/35572",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Exploit"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|