René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

102 lines
3.8 KiB
JSON

{
"id": "CVE-2011-4340",
"sourceIdentifier": "secalert@redhat.com",
"published": "2012-02-12T22:55:00.903",
"lastModified": "2017-08-29T01:30:29.317",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Symphony CMS 2.2.3 and possibly other versions before 2.2.4 allow remote authenticated users with Author privileges to inject arbitrary web script or HTML via (1) the profile parameter to extensions/profiledevkit/content/content.profile.php, as demonstrated via requests to (a) the default URI, (b) about/, or (c) drafts/; or (2) the filter parameter in symphony/lib/core/class.symphony.php, as demonstrated via requests to (d) symphony/publish/comments or (e) symphony/publish/images. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en Symphony CMS v2.2.3 y posiblemente otras versiones antes de v2.2.4 permite inyectar secuencias de comandos web o HTML, a usuarios remotos autenticados con privilegios de Autor, a trav\u00e9s de (1) el par\u00e1metro 'profile' (perfil) en extensions/profiledevkit/content/content.profile.php, tal y como se demuestra a trav\u00e9s de peticiones a (a) la URI por defecto, (b) about/, o (c) drafts/, o (2) el par\u00e1metro 'filter' en symphony/lib/core/class.symphony.php, tal y como se demuestra a trav\u00e9s de peticiones a (d) symphony/publish/comments o (e) symphony/publish/images. NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceros."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:symphony-cms:symphony_cms:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B104F5B3-ED98-4188-A1FA-16ECBA79E0E8"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.org/files/view/106493/symphonycms-sqlxss.txt",
"source": "secalert@redhat.com"
},
{
"url": "http://seclists.org/bugtraq/2011/Nov/8",
"source": "secalert@redhat.com"
},
{
"url": "http://symphony-cms.com/download/releases/version/2.2.4/",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.mavitunasecurity.com/xss-and-sql-injection-vulnerabilities-in-symphony-cms/",
"source": "secalert@redhat.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/11/22/9",
"source": "secalert@redhat.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71106",
"source": "secalert@redhat.com"
}
]
}