{ "id": "CVE-2011-1949", "sourceIdentifier": "secalert@redhat.com", "published": "2011-06-06T19:55:02.160", "lastModified": "2024-11-21T01:27:22.217", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the safe_html filter in Products.PortalTransforms in Plone 2.1 through 4.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2010-2422." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Filtro safe_html en Products.PortalTransforms de Plone v2.1 hasta v4.1, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados, vulnerabilidad diferente de CVE-2010-2422.\r\n" } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "08747064-EC22-40B4-92EF-4640788FE55D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A4EB85E3-9A76-4B79-AF7D-91484784A2EF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "78755057-2613-4D5E-8F59-2C117EE282B6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "D49359CD-63EF-4D3A-92DC-C16DEE88138B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9DE940BA-B784-4193-AB77-333F15B6C32D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9762C674-380B-4831-BBA1-3B27742121B0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D938645-80CE-4287-830E-A3BD0C5C84FB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BB0F7BFC-DC20-46B3-90E7-264E3A8A7886" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2C09C10-AEA0-41F4-B964-507B40580BE9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7B60568E-A688-46AF-B627-062A029A7324" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B635DAD-AC53-4484-8750-200B662DAFD1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B647E76-E8B8-4329-8848-3B90EB262807" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D0A6B8F-4018-44DC-9862-45309619DC6D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "0F10374F-2BB3-48D2-B19F-9B2D038A8E35" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEAC4F93-D26C-48F3-A7FF-8DC008FC2671" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "552661B7-093D-4B3C-8770-FCDE6032AA17" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "5180F9D2-E44B-455D-968C-792026AC832A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "636226E4-B880-41FE-A727-EF56CF8E6249" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF6E934A-C344-4861-8CD4-D18D52672D5C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "25780BBE-8013-4100-9EA8-7EFC244399A0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A089ED64-07E6-4F4C-97AE-AF74269A4DB1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "EF2334C9-9B34-4C7D-93A2-172E596E05C6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "354046F4-FA55-4AFC-935A-C803D36CDE86" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DF1496A7-6D0A-4970-B0BF-83758065BC6A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "47DEF57C-92F0-4999-AF8E-CEE27EE92CD6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "4BED4241-D823-402A-A389-7E52C410E2F7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "CE9A55E6-F265-4BB8-8683-3E0CFA01EC73" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "970FD910-50A4-478A-ADE6-EB912C261DAD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "0A490523-1063-44E4-A72A-C23070279181" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "D8559F17-63D1-45DB-8A28-47F729DC6686" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "FDC93803-6506-4382-A013-18010EE7E06B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E65977FD-A880-4D16-B56B-94A72774F42D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "4EA5B4F8-2155-403D-97D8-1272285D508B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3CA2943-77E5-4384-A019-415BBCE62F94" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B7FF63F6-F1DC-4A97-A2E6-11CF613A31E8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "538A3519-5B04-4FE5-A3C0-FD26EFA32705" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F3306D84-0F5B-46BA-9BCC-DCD0A1CDD604" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E08F4534-A588-463F-A745-39E559AB1CB8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B64341BA-5722-415E-9771-9837168AB7C0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "E2929227-AE19-428D-9AC3-D312A559039B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B6DC866-0FEE-475B-855C-A69E004810CD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "50BF3E8E-152C-4E89-BAA2-A952D10F4611" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "49DB97A7-89DD-43C0-A490-84AA7069764B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7C44B53B-953B-4522-A5B4-11573850D2CD" } ] } ] } ], "references": [ { "url": "http://osvdb.org/72728", "source": "secalert@redhat.com" }, { "url": "http://plone.org/products/plone/security/advisories/CVE-2011-1949", "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/44775", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/44776", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://securityreason.com/securityalert/8269", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/archive/1/518155/100/0/threaded", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/bid/48005", "source": "secalert@redhat.com" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67694", "source": "secalert@redhat.com" }, { "url": "http://osvdb.org/72728", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://plone.org/products/plone/security/advisories/CVE-2011-1949", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/44775", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/44776", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://securityreason.com/securityalert/8269", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/518155/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/48005", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67694", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }