René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

128 lines
4.2 KiB
JSON

{
"id": "CVE-2018-6182",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-04-09T20:29:00.323",
"lastModified": "2018-05-16T14:34:16.837",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Mahara 16.10 before 16.10.9 and 17.04 before 17.04.7 and 17.10 before 17.10.4 are vulnerable to bad input when TinyMCE is bypassed by POST packages. Therefore, Mahara should not rely on TinyMCE's code stripping alone but also clean input on the server / PHP side as one can create own packets of POST data containing bad content with which to hit the server."
},
{
"lang": "es",
"value": "Mahara, en versiones 16.10 anteriores a la 16.10.9, versiones 17.04 anteriores a la 17.04.7 y versiones 17.10 anteriores a la 17.10.4 es vulnerable a malas entradas cuando TinyMCE es omitido por los paquetes POST. Por lo tanto, Mahara no deber\u00eda depender solamente de la eliminaci\u00f3n de c\u00f3digo de TinyMCE, sino tambi\u00e9n de las entradas limpias del lado del servidor/PHP, ya que se pueden crear paquetes propios de datos POST que contienen malos contenidos con los que alcanzar el servidor."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mahara:mahara:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.10",
"versionEndExcluding": "16.10.9",
"matchCriteriaId": "B16B96BD-D5EF-4D8D-AD78-CE16A6AB0B4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mahara:mahara:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.04",
"versionEndExcluding": "17.04.7",
"matchCriteriaId": "25805CCF-F2E5-49B4-992B-65717A3ED539"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mahara:mahara:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.10",
"versionEndExcluding": "17.10.4",
"matchCriteriaId": "2BA183B6-D1A9-40A2-A500-D5912E0DE5B9"
}
]
}
]
}
],
"references": [
{
"url": "https://bugs.launchpad.net/mahara/+bug/1744789",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://mahara.org/interaction/forum/topic.php?id=8215",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}