{ "id": "CVE-2004-2742", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", "lastModified": "2017-07-29T01:29:18.750", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the report viewer in Crystal Enterprise 8.5, 9, and 10 allows remote attackers to inject arbitrary web script or HTML via script in the URL to a report (RPT) file." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:businessobjects:crystal_enterprise:8.5:*:aix:*:*:*:*:*", "matchCriteriaId": "5ADD5E80-DCAC-4C06-986F-651989B6D72B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:businessobjects:crystal_enterprise:8.5:*:solaris:*:*:*:*:*", "matchCriteriaId": "C2F1EC12-38F0-4DB5-90DC-A1932A38CD8A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:businessobjects:crystal_enterprise:8.5:*:windows:*:*:*:*:*", "matchCriteriaId": "FA106A23-74E5-408C-954F-94245AAF3B72" }, { "vulnerable": true, "criteria": "cpe:2.3:a:businessobjects:crystal_enterprise:9:*:windows:*:*:*:*:*", "matchCriteriaId": "EC102DAF-64D4-4B5F-8DA6-1389355E2095" }, { "vulnerable": true, "criteria": "cpe:2.3:a:businessobjects:crystal_enterprise:10:*:aix:*:*:*:*:*", "matchCriteriaId": "77891037-D3CD-4457-BF8D-490CEE7FA67C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:businessobjects:crystal_enterprise:10:*:hpux:*:*:*:*:*", "matchCriteriaId": "35A374F1-9F78-45C8-8A7C-F4D03EED0FBC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:businessobjects:crystal_enterprise:10:*:linux:*:*:*:*:*", "matchCriteriaId": "DC7AF62C-2763-467F-BBB8-C2CF8ABEA532" }, { "vulnerable": true, "criteria": "cpe:2.3:a:businessobjects:crystal_enterprise:10:*:solaris:*:*:*:*:*", "matchCriteriaId": "51428D65-D2DB-474D-8F30-B3C6C1C4DD48" }, { "vulnerable": true, "criteria": "cpe:2.3:a:businessobjects:crystal_enterprise:10:*:windows:*:*:*:*:*", "matchCriteriaId": "F1B2F81A-F8DB-4976-B1A2-1A191B83458B" } ] } ] } ], "references": [ { "url": "http://securitytracker.com/id?1012703", "source": "cve@mitre.org" }, { "url": "http://support.businessobjects.com/library/kbase/articles/c2016559.asp", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://www.securityfocus.com/bid/12107", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18684", "source": "cve@mitre.org" } ] }