2024-07-14 02:06:08 +00:00

99 lines
3.4 KiB
JSON

{
"id": "CVE-2009-4848",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-05-07T18:30:01.297",
"lastModified": "2018-10-10T19:49:32.120",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in ToutVirtual VirtualIQ Pro 3.2 build 7882 and 3.5 build 8691 allow remote attackers to inject arbitrary web script or HTML via the (1) userId parameter to tvserver/server/user/setPermissions.jsp, (2) deptName parameter to tvserver/server/user/addDepartment.jsp, (3) ID parameter to tvserver/server/inventory/inventoryTabs.jsp, (4) reportName parameter to tvserver/reports/virtualIQAdminReports.do, or (5) middleName parameter in a save action to tvserver/user/user.do."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en ToutVirtual VirtualIQ Pro v3.2 build 7882 y v3.5 build 8691, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro (1) userId sobre tvserver/server/user/setPermissions.jsp, (2) deptName sobre tvserver/server/user/addDepartment.jsp, (3) ID sobre tvserver/server/inventory/inventoryTabs.jsp, (4) reportName sobre tvserver/reports/virtualIQAdminReports.do, o (5) middleName en una acci\u00f3n \"save\" sobre tvserver/user/user.do."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:toutvirtual:virtualiq:3.2:-:pro:*:*:*:*:*",
"matchCriteriaId": "7EC29310-51F5-4D1C-B398-F08A102A7A45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:toutvirtual:virtualiq:3.5:-:pro:*:*:*:*:*",
"matchCriteriaId": "FAD9D8B2-EA53-47AF-8703-C9B8F2B2B9DC"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/37359",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securenetwork.it/ricerca/advisory/download/SN-2009-02.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/archive/1/507729/100/0/threaded",
"source": "cve@mitre.org"
}
]
}