mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
102 lines
3.8 KiB
JSON
102 lines
3.8 KiB
JSON
{
|
|
"id": "CVE-2011-4340",
|
|
"sourceIdentifier": "secalert@redhat.com",
|
|
"published": "2012-02-12T22:55:00.903",
|
|
"lastModified": "2017-08-29T01:30:29.317",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Symphony CMS 2.2.3 and possibly other versions before 2.2.4 allow remote authenticated users with Author privileges to inject arbitrary web script or HTML via (1) the profile parameter to extensions/profiledevkit/content/content.profile.php, as demonstrated via requests to (a) the default URI, (b) about/, or (c) drafts/; or (2) the filter parameter in symphony/lib/core/class.symphony.php, as demonstrated via requests to (d) symphony/publish/comments or (e) symphony/publish/images. NOTE: some of these details are obtained from third party information."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en Symphony CMS v2.2.3 y posiblemente otras versiones antes de v2.2.4 permite inyectar secuencias de comandos web o HTML, a usuarios remotos autenticados con privilegios de Autor, a trav\u00e9s de (1) el par\u00e1metro 'profile' (perfil) en extensions/profiledevkit/content/content.profile.php, tal y como se demuestra a trav\u00e9s de peticiones a (a) la URI por defecto, (b) about/, o (c) drafts/, o (2) el par\u00e1metro 'filter' en symphony/lib/core/class.symphony.php, tal y como se demuestra a trav\u00e9s de peticiones a (d) symphony/publish/comments o (e) symphony/publish/images. NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceros."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 3.5
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 6.8,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:symphony-cms:symphony_cms:2.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B104F5B3-ED98-4188-A1FA-16ECBA79E0E8"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://packetstormsecurity.org/files/view/106493/symphonycms-sqlxss.txt",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/bugtraq/2011/Nov/8",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://symphony-cms.com/download/releases/version/2.2.4/",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.mavitunasecurity.com/xss-and-sql-injection-vulnerabilities-in-symphony-cms/",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2011/11/22/9",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71106",
|
|
"source": "secalert@redhat.com"
|
|
}
|
|
]
|
|
} |