{ "id": "CVE-2009-2947", "sourceIdentifier": "cve@mitre.org", "published": "2009-09-14T16:30:00.500", "lastModified": "2024-11-21T01:06:07.637", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Xapian Omega before 1.0.16 allows remote attackers to inject arbitrary web script or HTML via unspecified CGI parameter values, which are sometimes included in exception messages." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Xapian Omega v1.0.16, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de valores no especificados en el par\u00e1metro CGI, que en ocasiones es incluido en los mensajes de excepci\u00f3n." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.0.15", "matchCriteriaId": "E5B32B09-2211-446C-9605-50E5D2A647CF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE0DDC19-0F30-4974-918A-C30C86ABFA3F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "CBED9111-D09D-4216-85AC-DEE45FA3F7F9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "B4A52A7C-45E2-4EBD-8F0D-3689EB2D5E15" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "FE37440F-00ED-4CE5-83F8-6E37FD6BDAAD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "B0F73199-1EA7-46DF-8B2E-AA14D85A1DCD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "A8902A27-A219-46FA-9A8A-3E946A253EBB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0C83D2F-C7B0-4010-9C17-FE5F813C07B5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "BC0E29D0-A8A9-4859-8B96-46BC77474EC8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "625F72A9-33B2-4599-BB85-307BB0E1A70C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "586A4BFF-EE02-446D-813D-4047CAB76691" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DB61F8E-5796-42C5-BC33-F1DD0177CFB5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "C7E31076-63C4-402C-9DB4-67A466722B4E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "3DE12CF1-0D72-48B4-B775-1E504F27E4DE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "9BB55590-D2E5-4D22-A3BB-0A2D33C584AC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "6D5EE25F-10A4-41EE-8E28-2C9CBD4736BA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "6B3321D2-77C1-4592-8CD0-3E7C52F7F107" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "C27123FE-9348-48A1-9678-A31548CA21EA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "BBA3DE2E-FECC-4775-A4C7-FA88FB474EEF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "80B31509-3028-498C-8FF3-B93F1F33BDD9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DB2C533D-ED06-4676-A8F3-BA664CB107A6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "CF912E95-618D-439B-8231-CD45C5966CE7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3A89463B-AD9B-4B61-9BFF-F003470E8D6F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "0C1E5EE7-A605-4D0A-BC1C-A6F42BDA39C8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "C6DA8916-91BE-4C3E-83FD-2471BDE93BA8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E982B22A-3368-4FD7-BD4D-A7A1E3F2DEBD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "458012D3-B354-4984-BAC1-E8810EF73432" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "2B66D8A5-8CF6-4752-AD21-CCB32780286B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A3EE2CF9-5C0E-4291-A694-C0D327415730" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB0460-C0C2-4A72-A575-F3DAD299EE6A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "3B462D97-AD4D-4F0E-865D-D2D879ADC177" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xapian:omega:1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "0EEA96B4-838C-4137-B5A3-736DD618B3CC" } ] } ] } ], "references": [ { "url": "http://lists.xapian.org/pipermail/xapian-discuss/2009-September/007115.html", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/36674", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/36693", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://svn.xapian.org/%2Acheckout%2A/tags/1.0.16/xapian-applications/omega/NEWS", "source": "cve@mitre.org" }, { "url": "http://www.debian.org/security/2009/dsa-1882", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/36317", "source": "cve@mitre.org" }, { "url": "http://lists.xapian.org/pipermail/xapian-discuss/2009-September/007115.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://secunia.com/advisories/36674", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/36693", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://svn.xapian.org/%2Acheckout%2A/tags/1.0.16/xapian-applications/omega/NEWS", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.debian.org/security/2009/dsa-1882", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/36317", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }