2024-12-08 03:06:42 +00:00

116 lines
3.7 KiB
JSON

{
"id": "CVE-2018-15903",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-10-08T17:29:00.327",
"lastModified": "2024-11-21T03:51:41.070",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Discuss v1.2.1 module in Claromentis 8.2.2 is vulnerable to stored Cross Site Scripting (XSS). An authenticated attacker will be able to place malicious JavaScript in the discussion forum, which is present in the login landing page. A low privilege user can use this to steal the session cookies from high privilege accounts and hijack these, enabling them to hijack the elevated session and perform actions in their security context."
},
{
"lang": "es",
"value": "El m\u00f3dulo Discuss v1.2.1 en Claromentis 8.2.2 es vulnerable a Cross-Site Scripting (XSS) persistente. Un atacante autenticado ser\u00e1 capaz de colocar JavaScript malicioso en el foro de discusi\u00f3n, que est\u00e1 presente en la p\u00e1gina de aterrizaje de inicio de sesi\u00f3n. Un usuario con pocos privilegios puede aprovecharse de esto para robar las cookies de sesi\u00f3n de cuentas con altos privilegios y secuestrarlas, lo que les permite secuestrar la sesi\u00f3n elevada y realizar acciones en su contexto de seguridad."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"baseScore": 3.5,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:claromentis:claromentis:8.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F10AF55D-8A0C-4CC7-9A6E-F0714ACFB96E"
}
]
}
]
}
],
"references": [
{
"url": "https://seclists.org/fulldisclosure/2018/Oct/12",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://seclists.org/fulldisclosure/2018/Oct/12",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
}
]
}