2024-04-04 08:46:00 +00:00

197 lines
6.0 KiB
JSON

{
"id": "CVE-2010-4207",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-11-07T22:00:03.770",
"lastModified": "2011-02-05T07:00:16.790",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the Flash component infrastructure in YUI 2.4.0 through 2.8.1, as used in Bugzilla, Moodle, and other products, allows remote attackers to inject arbitrary web script or HTML via vectors related to charts/assets/charts.swf."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en la infraestructura del componente de Flash en YUI v2.4.0 hasta v2.8.1, tal como se emplea en Bugzilla, Moodle y otros productos, permite a atacantes remotos inyectar secuencias de comandos web o HTML mediante vectores relacionados con charts/assets/charts.swf.\r\n"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yahoo:yui:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "50F634D1-01D7-4DA6-87F0-5B2DEEE5474D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yahoo:yui:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9EF394F4-B2D5-4C7D-B4D8-06E534DAD4BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yahoo:yui:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E4401EEC-0283-4E44-BEBF-06649B6876B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yahoo:yui:2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "603CFB72-FE66-446C-8574-DED64A54BB78"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yahoo:yui:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AB1CFBB7-8416-4910-918C-698DA28E963A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yahoo:yui:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DE7E6D30-7D9B-4D30-B47F-E1F7F6E6F8E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yahoo:yui:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DF48039A-91E3-46AB-9976-8E4B5F656B76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yahoo:yui:2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B573788D-91EB-42A9-8E25-11B8F8483638"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A17F6CB-1A34-4EC9-A8D4-F4BC5E00F3F2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:mozilla:bugzilla:*:*:*:*:*:*:*:*",
"matchCriteriaId": "558D05E1-A3A5-4C12-89AF-88D6442930AA"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050813.html",
"source": "cve@mitre.org"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050820.html",
"source": "cve@mitre.org"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050830.html",
"source": "cve@mitre.org"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html",
"source": "cve@mitre.org"
},
{
"url": "http://moodle.org/mod/forum/discuss.php?d=160910",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/41955",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/42271",
"source": "cve@mitre.org"
},
{
"url": "http://www.bugzilla.org/security/3.2.8/",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/11/07/1",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/514622",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/44420",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1024683",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2010/2878",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2010/2975",
"source": "cve@mitre.org"
},
{
"url": "http://yuilibrary.com/support/2.8.2/",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}