mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
106 lines
4.6 KiB
JSON
106 lines
4.6 KiB
JSON
{
|
|
"id": "CVE-2009-3017",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-08-31T16:30:07.047",
|
|
"lastModified": "2024-11-21T01:06:19.030",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Orca Browser 1.2 build 5 does not properly block data: URIs in Refresh and Location headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header that contains JavaScript sequences in a data:text/html URI, (2) entering a data:text/html URI with JavaScript sequences when specifying the content of a Refresh header, (3) injecting a Location header that contains JavaScript sequences in a data:text/html URI, or (4) entering a data:text/html URI with JavaScript sequences when specifying the content of a Location header; and does not properly handle javascript: URIs in HTML links within 302 error documents sent from web servers, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (5) injecting a Location HTTP response header or (6) specifying the content of a Location HTTP response header."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Orca Browser v1.2 build 5 no bloquea URIs data: en cabeceras Refresh y Location en respuestas HTTP, lo que permite a atacantes remotos realizar un ataque de ejecuci\u00f3n de secuencias de comandos en sitios cruzados a trav\u00e9s de vectores relativos a (1) inyectando una cabecera Refresh que contiene secuencias Javascript en URIs data:text/html, (2) introduciendo una _URI data:text/html con secuencias javascript cuando se especifica el contenidos de una cabecera Refresh, (3) inyectando una cabecera Location que contiene secuencias Javascript en una URI data:text/html o (4) introduciendo una URI data:text/html con secuencias Javascript cuando se especifica el contenido de la cabecera Location; y no maneja de forma adecuada las URIs Javascript: en los enlaces Javascript incluidos en los documentos de error 302 enviados por los servidores web, lo que provoca que atacantes remotos asistidos por usuarios realizar un ataque de ejecuci\u00f3n de secuencias de comandos en sitios cruzados a trav\u00e9s de vectores relativos a (5) inyecci\u00f3n de una cabecera Location de respuesta HTTP o (6) especificando el contenido de una cabecera Location de respuesta HTTP.\r\n"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"baseScore": 4.3,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:orcabrowser:orca_browser:1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B546ACE7-C740-4E0E-8B58-DB30D05FD375"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://websecurity.com.ua/3386/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/506163/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53002",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://websecurity.com.ua/3386/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/506163/100/0/threaded",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53002",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |