{ "id": "CVE-2013-5320", "sourceIdentifier": "cve@mitre.org", "published": "2013-08-20T14:55:47.140", "lastModified": "2024-11-21T01:57:18.533", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Forums/EditPost.aspx in mojoPortal before 2.3.9.8 allows remote attackers to inject arbitrary web script or HTML via the txtSubject parameter." }, { "lang": "es", "value": "Vulnerabilidad de XSS en Forums/EditPost.aspx en mojoPortal anterior a 2.3.9.8, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarias a trav\u00e9s del par\u00e1metro \"txtSubject\"." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.3.9.7", "matchCriteriaId": "CCC0798D-E8DD-4343-B0F2-F339E2955BF9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E59C176F-D536-4810-A355-52DF391B3952" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "968DE841-0BFC-4AEF-80CE-93BE0EBBEA3F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "89619B01-0E71-4BBE-8CFD-8CF3F3214528" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB6AF073-AE44-4C2D-B4A5-38AB62B1A284" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A399E2DF-C72A-4971-99A5-927227637B9B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "403D4511-8936-499B-9140-FC4E909BED11" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "31413CC1-0CE7-42D4-B663-0212DD3E13BB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D0DC30B-7E08-4D0F-BA05-53B9CE0C1E08" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "F1FCBFD0-FF17-453F-A580-9384CDA71386" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "8841C42A-A547-40C2-B53C-B7D60229788E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "E8509CAE-5AFA-42A2-8BDC-3A60E30974CC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FAFAC7F-F11B-4C88-8592-EC09735082FA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "4A282F26-EACD-49AB-B105-C85108D131B4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "E04A7D4B-1983-4161-BC1F-CBF1BE573278" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "53AF046B-781A-4ADA-AD54-2C39E107B340" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4CEF6265-F3B8-4A82-9A01-81A762FBA6B3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "5A0CE2D5-25D7-4E9A-95EF-CC48FE3ADC6C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E953FBF-441E-49ED-94F6-688A13479416" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "F4EED09D-34E7-4A3B-BA03-C614A2C70E52" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "912A2719-C5F9-4FA5-B269-907F55114442" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "2128BA9A-A23A-432C-9C5A-B684F119C400" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "78DF57FD-EF83-4BE3-9DC4-BA52B7D3417A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCFE3632-5E17-49A6-B4A2-D446146425B3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "038DDB13-CA10-40ED-8A1C-BCDC21172478" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "04E35D3B-D0A5-49A0-B133-D55932411CE1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "6F32F9F6-1B5B-45A8-B7FC-DA27A29BD982" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CDDE77F8-7C3F-4EA1-BCE3-0C3365632E7D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "8BD63DC8-26B6-49FB-94F2-E881471949F4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "07499CF0-A5EA-497A-B95F-5D019AD162E3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "981A020A-6B07-457B-A308-3136E1DE7007" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "9A8E68E4-B89C-4162-8B68-E5666B670F1E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "8C45590B-C69F-452D-8F87-47D3AD8252F1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "CD357348-E0AE-40BF-9DA0-F26463B6741F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "D0462C81-8CA8-4953-B5B6-EDB2A0EAAD5E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "837CB0AC-2A72-4C09-B00D-D673404AA39D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD829F60-4C1A-49EA-9E2C-8F7FC0005E88" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "472BFC3B-283C-4E5D-BC4D-7C03DD6F9AF3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "7AAE8C9F-ED1E-46DC-9592-D2AA912D9BC6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A0A0562C-F8EE-4F0A-A8CA-E779C240F454" } ] } ] } ], "references": [ { "url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0200.html", "source": "cve@mitre.org" }, { "url": "http://osvdb.org/95847", "source": "cve@mitre.org" }, { "url": "http://packetstormsecurity.com/files/122608/MojoPortal-2.3.9.7-Cross-Site-Scripting.html", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://secunia.com/advisories/54297", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/61520", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86058", "source": "cve@mitre.org" }, { "url": "https://www.mojoportal.com/mojoportal-2398-released", "source": "cve@mitre.org" }, { "url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0200.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://osvdb.org/95847", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://packetstormsecurity.com/files/122608/MojoPortal-2.3.9.7-Cross-Site-Scripting.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "http://secunia.com/advisories/54297", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/61520", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86058", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://www.mojoportal.com/mojoportal-2398-released", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }