mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
63 lines
2.7 KiB
JSON
63 lines
2.7 KiB
JSON
{
|
|
"id": "CVE-2024-28112",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-03-12T20:15:07.730",
|
|
"lastModified": "2024-03-13T12:33:51.697",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Peering Manager is a BGP session management tool. Affected versions of Peering Manager are subject to a potential stored Cross-Site Scripting (XSS) attack in the `name` attribute of AS or Platform. The XSS triggers on a routers detail page. Adversaries are able to execute arbitrary JavaScript code with the permission of a victim. XSS attacks are often used to steal credentials or login tokens of other users. This issue has been addressed in version 1.8.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Peering Manager es una herramienta de gesti\u00f3n de sesiones BGP. Las versiones afectadas de Peering Manager est\u00e1n sujetas a un posible ataque de Cross-Site Scripting (XSS) almacenado en el atributo \"nombre\" de AS o plataforma. El XSS se activa en la p\u00e1gina de detalles de un enrutador. Los adversarios pueden ejecutar c\u00f3digo JavaScript arbitrario con el permiso de la v\u00edctima. Los ataques XSS se utilizan a menudo para robar credenciales o tokens de inicio de sesi\u00f3n de otros usuarios. Este problema se solucion\u00f3 en la versi\u00f3n 1.8.3. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.1,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 0.9,
|
|
"impactScore": 5.2
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/peering-manager/peering-manager/security/advisories/GHSA-fmf5-24pq-rq2w",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://owasp.org/www-community/attacks/xss",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |