{ "id": "CVE-2007-5112", "sourceIdentifier": "cve@mitre.org", "published": "2007-09-26T23:17:00.000", "lastModified": "2018-10-15T21:40:24.270", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in session.cgi (aka the login page) in Google Urchin 5 5.7.03 and earlier allows remote attackers to inject arbitrary web script or HTML via the query string, a different vulnerability than CVE-2007-4713. NOTE: this can be leveraged to capture login credentials in some browsers that support remembered (auto-completed) passwords." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en session.cgi (tambi\u00e9n conocido como p\u00e1gina de inicio de sesi\u00f3n) de Google Urchin 5 5.7.03 y anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante la cadena de consulta, una vulnerabilidad diferente de CVE-2007-4713. NOTA: esto puede ser utilizado para capturar las credenciales de acceso en algunos navegadores que soportan el recuerdo de contrase\u00f1as (auto-completado)." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:roi_revolution:urchin:*:*:*:*:*:*:*:*", "versionEndIncluding": "5.7.03", "matchCriteriaId": "A5A11BEC-F78B-4883-8D47-EFACD23C30A2" } ] } ] } ], "references": [ { "url": "http://ha.ckers.org/blog/20070823/xss-and-possible-information-disclosure-in-urchin/", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://hackademix.net/2007/09/24/googhole-xss-pwning-gmail-picasa-and-almost-200k-customers/", "source": "cve@mitre.org" }, { "url": "http://securityreason.com/securityalert/3177", "source": "cve@mitre.org" }, { "url": "http://securityvulns.ru/Sdocument90.html", "source": "cve@mitre.org" }, { "url": "http://websecurity.com.ua/1283/", "source": "cve@mitre.org" }, { "url": "http://www.gnucitizen.org/blog/google-urchin-password-theft-madness", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/archive/1/480469/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/25788", "source": "cve@mitre.org", "tags": [ "Exploit" ] } ] }