{ "id": "CVE-2008-0980", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-25T23:44:00.000", "lastModified": "2018-10-15T22:04:04.373", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Spyce - Python Server Pages (PSP) 2.1.3 allow remote attackers to inject arbitrary web script or HTML via (1) the url or type parameter to docs/examples/redirect.spy; (2) the x parameter to docs/examples/handlervalidate.spy; (3) the name parameter to spyce/examples/request.spy; (4) the Name parameter to spyce/examples/getpost.spy; (5) the mytextarea parameter, the mypass parameter, or an empty parameter to spyce/examples/formtag.spy; (6) the newline parameter to the default URI under demos/chat/; (7) the text1 parameter to docs/examples/formintro.spy; or (8) the mytext or mydate parameter to docs/examples/formtag.spy." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de tipo cross-site scripting (XSS) en Spyce - Python Server Pages (PSP) versi\u00f3n 2.1.3, permiten a atacantes remotos inyectar script web o HTML arbitrario por medio de (1) el par\u00e1metro url o type en le archivo docs/examples/redirect.spy; (2) el par\u00e1metro x en el archivo docs/examples/handlervalidate.spy; (3) el par\u00e1metro Name en el archivo spyce/examples/request.spy; (4) el par\u00e1metro Name en el archivo spyce/examples/getpost.spy; (5) el par\u00e1metro mytextarea, el par\u00e1metro mypass, o un par\u00e1metro vac\u00edo en el archivo spyce/examples/formtag.spy; (6) el par\u00e1metro newline en el URI predeterminado bajo demos/chat/; (7) el par\u00e1metro text1 en el archivo docs/examples/formintro.spy; o (8) el par\u00e1metro mytext o mydate en el archivo docs/examples/formtag.spy." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:spyce:spyce:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "77B53AFC-5C42-4BDE-BFFB-DEFF9D702357" } ] } ] } ], "references": [ { "url": "http://securityreason.com/securityalert/3699", "source": "cve@mitre.org" }, { "url": "http://www.procheckup.com/Vulnerability_PR08-01.php", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.securityfocus.com/archive/1/488336/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/27898", "source": "cve@mitre.org", "tags": [ "Exploit" ] } ] }