{ "id": "CVE-2021-3535", "sourceIdentifier": "cve@rapid7.con", "published": "2021-06-16T02:15:06.687", "lastModified": "2021-06-22T19:23:37.003", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Rapid7 Nexpose is vulnerable to a non-persistent cross-site scripting vulnerability affecting the Security Console's Filtered Asset Search feature. A specific search criterion and operator combination in Filtered Asset Search could have allowed a user to pass code through the provided search field. This issue affects version 6.6.80 and prior, and is fixed in 6.6.81. If your Security Console currently falls on or within this affected version range, ensure that you update your Security Console to the latest version." }, { "lang": "es", "value": "Rapid7 Nexpose es suceptible a una vulnerabilidad de tipo cross-site scripting no persistente que afecta a la funcionalidad Filtered Asset Search de Security Console. Un criterio de b\u00fasqueda espec\u00edfico y una combinaci\u00f3n de operadores en la b\u00fasqueda de activos filtrados podr\u00edan haber permitido a un usuario pasar c\u00f3digo mediante el campo de b\u00fasqueda proporcionado. Este problema afecta a la versi\u00f3n 6.6.80 y anteriores, y se ha corregido en la versi\u00f3n 6.6.81. Si su Security Console se encuentra actualmente dentro de este rango de versiones afectadas, aseg\u00farese de actualizar su Security Console a la \u00faltima versi\u00f3n" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 2.7 }, { "source": "cve@rapid7.con", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 1.4 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] }, { "source": "cve@rapid7.con", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:rapid7:nexpose:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.6.81", "matchCriteriaId": "240D303F-9A0A-4261-B4AB-02A6686A91C8" } ] } ] } ], "references": [ { "url": "https://docs.rapid7.com/release-notes/nexpose/20210505/", "source": "cve@rapid7.con", "tags": [ "Release Notes", "Vendor Advisory" ] } ] }