mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
220 lines
8.7 KiB
JSON
220 lines
8.7 KiB
JSON
{
|
|
"id": "CVE-2009-2268",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-07-01T13:00:01.420",
|
|
"lastModified": "2010-05-25T05:45:29.827",
|
|
"vulnStatus": "Modified",
|
|
"evaluatorImpact": "Per: http://secunia.com/advisories/35651\r\n\r\n\"NOTE: This only affects Sun Java System Access Manager if Cross-Domain Single Sign-On (CDSSO) functionality is enabled.\"",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the Cross-Domain Controller (CDC) servlet in Sun Java System Access Manager 6 2005Q1, 7 2005Q4, and 7.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en el Cross-Domain Controller (CDC) servlet en Sun Java System Access Manager v6 2005Q1, v7 2005Q4, y v7.1, permite a atacantes remotos ejecutar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 2.6
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 4.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "51EDB8CC-FD50-468F-BF06-91F415E1532D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:6.0_2005q1:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "6FAE06D6-34FF-45CA-9CD9-841817E787FA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:6.0_2005q1:*:solaris_10_sparc:*:*:*:*:*",
|
|
"matchCriteriaId": "C45AE084-74CB-47C7-8103-EBDEE2C3A2F1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:6.0_2005q1:*:solaris_10_x86:*:*:*:*:*",
|
|
"matchCriteriaId": "97A8B7AC-8343-4CDB-8757-12648D0C5B91"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:6.0_2005q1:*:solaris_8_sparc:*:*:*:*:*",
|
|
"matchCriteriaId": "84B5BE3F-27E7-4B3B-BD7B-A614DA625A36"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:6.0_2005q1:*:solaris_8_x86:*:*:*:*:*",
|
|
"matchCriteriaId": "3BE405DA-2ACF-4935-99D9-2E8940FBA279"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:6.0_2005q1:*:solaris_9_sparc:*:*:*:*:*",
|
|
"matchCriteriaId": "3566E0BB-A6B9-49A0-9B6C-918A1F11CE6C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:6.0_2005q1:*:solaris_9_x86:*:*:*:*:*",
|
|
"matchCriteriaId": "0A666DA6-E83C-4B37-913E-3FAD7B9EE4F7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D88350FE-285D-4144-B7DC-5E1F8579CC56"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7.0_2005q4:*:hp-ux:*:*:*:*:*",
|
|
"matchCriteriaId": "2807FF5E-F638-4F08-B34C-4532C1BC9908"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7.0_2005q4:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "34B7F28D-CBA5-44F7-AE6E-5EEB0EAF63B4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7.0_2005q4:*:solaris10_x86:*:*:*:*:*",
|
|
"matchCriteriaId": "7A0F58C0-642D-4FC2-94B6-35D3CA936DFB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7.0_2005q4:*:solaris9_x86:*:*:*:*:*",
|
|
"matchCriteriaId": "85E0C292-E453-4F14-915A-41AB7FBF21F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7.0_2005q4:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "B7821A43-2549-4B75-A201-95A3AC58E8BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0B5B089E-62AC-44E5-9462-DC439C7AA8A5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7.1:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "4CCDA95C-0EFF-4CF4-8CC6-EF110F0DAE76"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7.1:*:solaris_10_sparc:*:*:*:*:*",
|
|
"matchCriteriaId": "28F24915-078C-4E4B-B173-671F0ABF9656"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7.1:*:solaris_10_x86:*:*:*:*:*",
|
|
"matchCriteriaId": "AD06B92E-C23C-4648-A585-14FC54538FA2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7.1:*:solaris_8_sparc:*:*:*:*:*",
|
|
"matchCriteriaId": "CAABA44E-5FD1-4B71-A4DE-9DC671DD8223"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7.1:*:solaris_8_x86:*:*:*:*:*",
|
|
"matchCriteriaId": "4930E838-993A-4DA1-B504-4675EE20CF69"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7.1:*:solaris_9_sparc:*:*:*:*:*",
|
|
"matchCriteriaId": "2A857F82-4146-48E9-8568-19393AC3856B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7.1:*:solaris_9_x86:*:*:*:*:*",
|
|
"matchCriteriaId": "2D28C8EF-7525-48A0-A13A-EA95479A3B35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7.1:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "36C5F1CB-FEDE-4C19-B056-C846C86FDE8E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7_2005q4:*:solaris_10_sparc:*:*:*:*:*",
|
|
"matchCriteriaId": "B56B9BD3-2708-46C3-850D-865599F88BF9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7_2005q4:*:solaris_8_sparc:*:*:*:*:*",
|
|
"matchCriteriaId": "B6391170-5831-4303-85E5-A51BB431E788"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:java_system_access_manager:7_2005q4:*:solaris_9_sparc:*:*:*:*:*",
|
|
"matchCriteriaId": "745D8651-B97C-48A9-AE4F-603A34516919"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-03-1",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-256568-1",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory",
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020343.1-1",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |