2024-07-14 02:06:08 +00:00

216 lines
7.9 KiB
JSON

{
"id": "CVE-2009-0424",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-02-05T00:30:00.420",
"lastModified": "2017-08-08T01:33:56.470",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in sign1.php in AN Guestbook (ANG) before 0.7.7 allows remote attackers to inject arbitrary web script or HTML via the country parameter, which is not properly handled in (1) administrator/manage.php or (2) administrator/trash.php. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en AN Guestbook (ANG) antes de v0.7.7, permite a atacantes remotos inyectar secuencias de comandos web o HTML mediante el par\u00e1metro country, el cual no se maneja adecuadamente en (1) administrator/manage.php o (2) administrator/trash.php. NOTA: algunos de estos detalles se han obtenido de informaci\u00f3n de terceros."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.7.6",
"matchCriteriaId": "549A87F8-85AB-4118-B2D1-FBA0EF7C99AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "22AB4055-8383-4BAF-9838-DC8D8BCD19A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:0.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B44B5986-126D-4902-AD57-9BAA50278E33"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:0.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E4C9527B-EF66-42A1-AFD0-35C2CFFD14A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:0.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "457BA8EF-64AD-477C-A4A8-A1F3961C2339"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:0.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E0158BE8-54E0-4AB7-8BA4-0E95A2B22C44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "56A587CA-564F-4CDB-B65B-F1DB3B40EEA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CA1FCA7-E6D2-44F4-AF35-AC6EFB1ACA17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:0.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B21E8D94-04BE-4F76-BB55-9F398197F2EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "31423D65-B142-4F18-BAFB-2D097A2D8967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE5DFC6-8B2E-44B9-9A0C-27E3BBE5E488"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B468B2A9-464F-4ACF-BB9F-909E4F136245"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D7B247-8322-4787-BE94-6F55C4937F47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:0.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FA474D78-8749-4801-933F-94240CC2CED7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA55F57-50D1-45E7-90DF-947C683C675D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6E094E87-1B17-4AEB-B23D-984818533B24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E91A8A0F-0B59-44B1-9243-3BE07C453359"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BDCC557F-2686-4F2C-AF12-E6EA0B17148B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D85DF228-FE7B-4108-A71C-F557FF1630C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7A304300-3065-4D10-8E7B-8D9634A8C5E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C1D17E-AB2D-4C27-A17D-8D4761A7E4A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:2.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "F6A7A68B-EDD3-4883-9E5F-5B6166F2AED4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:an_guestbook:an_guestbook:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "97953D86-46EE-45FD-B41F-330B65BB88FC"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/33490",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://sourceforge.net/forum/forum.php?forum_id=907703",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://sourceforge.net/project/shownotes.php?release_id=653720",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/33292",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48018",
"source": "cve@mitre.org"
}
]
}