{ "id": "CVE-2009-0417", "sourceIdentifier": "cve@mitre.org", "published": "2009-02-10T07:00:20.327", "lastModified": "2024-11-21T00:59:51.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the AgaviWebRouting::gen(null) method in Agavi 0.11 before 0.11.6 and 1.0 before 1.0.0 beta 8 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with certain characters that are not properly handled by web browsers that do not strictly follow RFC 3986, such as Internet Explorer 6 and 7." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en el m\u00e9todo AgaviWebRouting::gen(null) en Agavi 0.11 anterior a v0.11.6 y v1.0 anterior v1.0.0 beta 8, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de una URL manipulada con ciertos caracteres que no son manejados adecuadamente por navegadores web que no siguen estrictamente el RFC 3986, como Internet Explorer 6 y 7." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5632C8D-6BE4-4EA1-A195-75B65D6CCCD8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5298F6FA-FFB1-44F1-AA53-526A0A46AD3A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "0920DDAB-14CE-482E-BE51-4CBC9A2FC5C3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "AE9D3982-0B46-4D99-8B3C-61174EE1CD0C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "AF58F03B-C62D-4173-815B-39FCBF3A6364" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "355EE49E-DD95-4EE9-A988-7161C4F79738" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D9410CE4-5BB2-49F1-A996-9FBE4326D9B5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "D9E18D45-843B-4BB8-9BF7-5C2FC67B0CCD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "A2CED3C5-8A5D-4FA3-BE30-CAEDB8BB1029" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "C6D4127B-31C7-43E5-83F7-B2857CB7EA99" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "1F1800B4-62E0-4B2E-99D7-F1A6C4E68D99" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.1:rc3:*:*:*:*:*:*", "matchCriteriaId": "7B5BCA3D-7642-4D3D-8FAB-980CCC23D199" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "0DE90C4D-F2A8-4317-BB92-F7885A125672" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "1D60E305-C39C-4982-9E9A-52E6DA872BCC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.2:rc2:*:*:*:*:*:*", "matchCriteriaId": "F465C91A-EDEB-4F81-8564-415041FAEB4B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.3:*:*:*:*:*:*:*", "matchCriteriaId": "EBD6A720-337D-4AD7-BB51-3F02124BF2D1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "C9C8B70F-B03C-4F6D-ACCA-F7C5D716C202" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "DA3B4E76-BF86-45BD-8EC6-B5614FACF3BA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "FAD7CE36-8319-432A-98F5-CA014C577023" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "04A8EBEF-1312-487B-B90E-75967FD011DF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "376968EF-1EBE-406D-8D59-CE280A39CF0B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "8D8294A9-32C1-4234-BE11-6C06C8C4E885" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.6:*:*:*:*:*:*:*", "matchCriteriaId": "BC2DA0DA-0424-41E8-B999-FDE8034A2443" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "DEFF8A61-0ADC-499C-968A-154F38904D49" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:0.11.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "25C9BC9D-8FB5-460F-8C9E-472B7AB2F57F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:1.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "3525B59A-F7B3-4D56-B2C0-5FE8AAA8F3CF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:1.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "F8CBA3F9-043B-4F8C-89C6-834179ECBD70" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:1.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "E3D141D7-4714-4E86-AE15-12331BF50DF2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:1.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "2B9937A6-37EF-43D4-877E-FBDDF3AF8BF6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:1.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "C162718B-8F33-49F6-B0E2-C1A2561C239C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:1.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "E5D29B16-C1EF-46C9-8C1E-0A76D62849D7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:agavi:agavi:1.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "B8769C6D-3C4F-4DC1-8A9D-B9430FA46F77" } ] } ] } ], "references": [ { "url": "http://blog.agavi.org/post/75829956/agavi-0-11-6-released-fixes-vulnerability", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://blog.agavi.org/post/75830918/agavi-1-0-0-beta-8-released-fixes-vulnerability", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://trac.agavi.org/ticket/1019", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/33826", "source": "cve@mitre.org" }, { "url": "http://blog.agavi.org/post/75829956/agavi-0-11-6-released-fixes-vulnerability", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://blog.agavi.org/post/75830918/agavi-1-0-0-beta-8-released-fixes-vulnerability", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://trac.agavi.org/ticket/1019", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/33826", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }