René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

157 lines
5.4 KiB
JSON

{
"id": "CVE-2014-2016",
"sourceIdentifier": "cve@mitre.org",
"published": "2014-03-25T18:21:48.233",
"lastModified": "2018-03-19T17:37:06.447",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in OXID eShop Professional and Community Edition 4.6.8 and earlier, 4.7.x before 4.7.11, and 4.8.x before 4.8.4, and Enterprise Edition 4.6.8 and earlier, 5.0.x before 5.0.11 and 5.1.x before 5.1.4 allow remote attackers to inject arbitrary web script or HTML via the searchtag parameter to the getTag function in (1) application/controllers/details.php or (2) application/controllers/tag.php."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de XSS en OXID eShop Professional and Community Edition 4.6.8 y anteriores, 4.7.x anterior a 4.7.11 y 4.8.x anterior a 4.8.4 y Enterprise Edition 4.6.8 y anteriores, 5.0.x anterior a 5.0.11 y 5.1.x anterior a 5.1.4 permiten a atacantes remotos inyectar script Web o HTML arbitrarios a trav\u00e9s del par\u00e1metro searchtag hacia la funci\u00f3n getTag en (1) application/controllers/details.php o (2) application/controllers/tag.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oxid-esales:eshop:*:*:*:*:community:*:*:*",
"versionEndIncluding": "4.6.8",
"matchCriteriaId": "60BF881E-E2F7-440D-9D0A-B35910737E50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oxid-esales:eshop:*:*:*:*:community:*:*:*",
"versionStartIncluding": "4.7.0",
"versionEndExcluding": "4.7.11",
"matchCriteriaId": "F7BA8D3A-2D28-4C88-9FF1-0EC1E85D0A38"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oxid-esales:eshop:*:*:*:*:community:*:*:*",
"versionStartIncluding": "4.8.0",
"versionEndExcluding": "4.8.4",
"matchCriteriaId": "FB4278C8-7513-453E-85D8-976585B21D17"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oxid-esales:eshop:*:*:*:*:enterprise:*:*:*",
"versionEndIncluding": "4.6.8",
"matchCriteriaId": "2CDB8C9B-769C-4AFE-8976-0EAE8207DE32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oxid-esales:eshop:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.0.11",
"matchCriteriaId": "7BAFCCBA-B925-46F1-AD6E-9FF5087A9149"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oxid-esales:eshop:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "5.1.0",
"versionEndExcluding": "5.1.4",
"matchCriteriaId": "97C77640-F154-4C88-A107-B265BB2F9005"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oxid-esales:eshop:*:*:*:*:professional:*:*:*",
"versionEndIncluding": "4.6.8",
"matchCriteriaId": "9D6FDE67-1E47-4DC9-8D3E-4B1C0EF655F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oxid-esales:eshop:*:*:*:*:professional:*:*:*",
"versionStartIncluding": "4.7.0",
"versionEndExcluding": "4.7.11",
"matchCriteriaId": "3390D62B-535C-4BEB-BC06-75B88BB50FC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oxid-esales:eshop:*:*:*:*:professional:*:*:*",
"versionStartIncluding": "4.8.0",
"versionEndExcluding": "4.8.4",
"matchCriteriaId": "781923C0-2694-4C44-BD20-144196E180BF"
}
]
}
]
}
],
"references": [
{
"url": "http://wiki.oxidforge.org/Security_bulletins/2014-001",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}