mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
142 lines
4.8 KiB
JSON
142 lines
4.8 KiB
JSON
{
|
|
"id": "CVE-2009-2342",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-07-07T19:30:00.250",
|
|
"lastModified": "2009-07-08T04:00:00.000",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in admin.php (aka the login page) in Content Management Made Easy (CMME) before 1.22 allows remote attackers to inject arbitrary web script or HTML via the username field."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en admin.php (tambi\u00e9n conocido como p\u00e1gina de login)de Content Management Made Easy (CMME) v1.22 y anteriores, permite a atacantes remotos inyectar c\u00f3digo web o HTML a su elecci\u00f3n a trav\u00e9s del campo nombre de usuario."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hans_oesterholt:cmme:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.21",
|
|
"matchCriteriaId": "F6F5F426-B5D9-4852-9A99-7A1CC97EF07B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hans_oesterholt:cmme:1.02:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DFC22F7C-B77B-4E7D-B7A5-C23DF080CF4B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hans_oesterholt:cmme:1.03:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "69496B41-06D4-4520-9B96-CA52340BCAFB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hans_oesterholt:cmme:1.06:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9FF586F-9FCE-44FD-86B4-BBD5D8960082"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hans_oesterholt:cmme:1.07:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CAA93DF4-E422-45C6-947D-72C39527503A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hans_oesterholt:cmme:1.08:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E78D4A3-1065-4209-ABA7-E37DC506738B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hans_oesterholt:cmme:1.09:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C291A60C-22B5-4BC2-9FD5-8C45EAFD7CB6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hans_oesterholt:cmme:1.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "58B5A1DE-2725-4CE8-B72B-94B40B2D292C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hans_oesterholt:cmme:1.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A585CC6-497B-4570-8CE9-78D3A25E2A6A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hans_oesterholt:cmme:1.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "63FA730E-6D1F-4F8B-A4CA-FF5A0B4CAC17"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hans_oesterholt:cmme:1.18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CDA0E7F0-E4E4-4E49-90A2-A8899545D46C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hans_oesterholt:cmme:1.19:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F67A768C-F508-4DFA-8F19-DD81F45A6CAA"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=694724",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://sourceforge.net/tracker/?func=detail&aid=2500186&group_id=215535&atid=1034058",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
}
|
|
]
|
|
} |