mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 17:51:17 +00:00
199 lines
7.3 KiB
JSON
199 lines
7.3 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2009-2898",
|
||
|
"sourceIdentifier": "secalert@redhat.com",
|
||
|
"published": "2009-10-13T10:30:00.530",
|
||
|
"lastModified": "2018-10-10T19:42:28.767",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Cross-site scripting (XSS) vulnerability in the Alerts list feature in the web interface in SpringSource Hyperic HQ 3.2.x before 3.2.6.1, 4.0.x before 4.0.3.1, 4.1.x before 4.1.2.1, and 4.2-beta1; Application Management Suite (AMS) 2.0.0.SR3; and tc Server 6.0.20.B allows remote authenticated users to inject arbitrary web script or HTML via the Description field. NOTE: some of these details are obtained from third party information."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Vulnerabilidad de Ejecuci\u00f3n de secuencias de comandos en sitios cruzados(XSS) en el listado de caracter\u00edsticas Alerts en la interface web en SpringSource Hyperic HQ v3.2.x anteirior v3.2.6.1, v4.0.x anterior v4.0.3.1, v4.1.x anterior v4.1.2.1, y v4.2-beta1; Application Management Suite (AMS) v2.0.0.SR3; y tc Server v6.0.20.B permite a usuarios autentificados remotamente inyectar c\u00f3digo web o HTML de su elecci\u00f3n a trav\u00e9s del campo Description. NOTA: algunos de estos detalles son obtenidos de informaci\u00f3n de terceros. \r\n"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "MEDIUM",
|
||
|
"authentication": "SINGLE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "PARTIAL",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 3.5
|
||
|
},
|
||
|
"baseSeverity": "LOW",
|
||
|
"exploitabilityScore": 6.8,
|
||
|
"impactScore": 2.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": true
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-79"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:application_management_suite:2.0.0:sr3:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "2B49CBBA-35CB-42A6-93D5-06C8F203C98B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2:beta_1:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E4DEFE03-6FCD-49C5-A0E7-370FEA7CF5B9"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "8A6E9004-B756-42BE-8918-691AF6F720FC"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F926074F-8BD2-4A30-B938-CA84E9533CAE"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1A3D6A50-33C3-4932-8A10-37BFF8D061E8"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "41519C07-5A0D-48ED-81B5-ABF712A6AB04"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.4:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "44A5F7C5-A739-4887-AE92-721426E404F5"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.5:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7F7EB2C3-639B-41B6-B23B-BEBE45EE1DCD"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:3.2.6:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DCA25CF4-9C98-4FED-A75E-68EF0B9E2C2C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:4.0.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CE0EC4F9-11EE-4326-A7C4-681CB451C45E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:4.0.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "90F45C4E-F068-44A0-B676-444D913B3719"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:4.0.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "602855A5-B269-46BD-B68E-DAA49B818A63"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:4.0.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CDDBC79C-1930-4474-94EE-1F046539F2C4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:4.1.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3BA42759-E3E8-4F6C-9542-FB939D9D2042"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:4.1.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "9FD405E4-D6B2-41AB-AE19-024192E8B25C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:4.1.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CC192682-AE08-4651-9C29-0753E2F85D65"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:hyperic_hq:4.2:beta_1:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3754D8A2-B5F6-44A9-BC1D-7A4FE925D070"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:springsource:tc_server:6.0.20:b:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "BC0FD679-8EB8-4F3D-8310-361E6AAC9299"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=advisory&name=Hyperic_HQ_Multiple_XSS",
|
||
|
"source": "secalert@redhat.com",
|
||
|
"tags": [
|
||
|
"Exploit",
|
||
|
"Patch"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://jira.hyperic.com/browse/HHQ-3390",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.coresecurity.com/content/hyperic-hq-vulnerabilities",
|
||
|
"source": "secalert@redhat.com",
|
||
|
"tags": [
|
||
|
"Patch"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/archive/1/506935/100/0/threaded",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/archive/1/506950/100/0/threaded",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.springsource.com/security/hyperic-hq",
|
||
|
"source": "secalert@redhat.com",
|
||
|
"tags": [
|
||
|
"Patch",
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53660",
|
||
|
"source": "secalert@redhat.com"
|
||
|
}
|
||
|
]
|
||
|
}
|