mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
278 lines
9.3 KiB
JSON
278 lines
9.3 KiB
JSON
{
|
|
"id": "CVE-2010-3022",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2010-08-16T20:00:03.153",
|
|
"lastModified": "2024-11-21T01:17:53.470",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the Performance logging module in the Devel module 5.x before 5.x-1.3 and 6.x before 6.x-1.21 for Drupal allows remote authenticated users, with add url aliases and report access permissions, to inject arbitrary web script or HTML via crafted node paths in a URL."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo \"Performance logging\" del m\u00f3dulo Devel v5.x anteriores a la v5.x-1.3 y v6.x anteriores a la v6.x-1.21 de Drupal permite a usuarios autenticados remotos, con permisos de acceso \"add url aliases\" y \"report\", inyectar c\u00f3digo de script o HTML de su elecci\u00f3n a trav\u00e9s de rutas de nodo modificadas en una URL."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
|
|
"baseScore": 2.6,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 4.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "5x-1.2",
|
|
"matchCriteriaId": "2D2A0A4B-C98C-4009-9C4D-6B97AF93DAE7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "6.x-1.20",
|
|
"matchCriteriaId": "28598F8A-82A9-4520-9277-9729547E7AAE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:5.x-1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "46E36EBD-7511-4CE5-B0B1-273B819F4B74"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:5.x-1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C25C771D-7AB0-42D7-8B5E-6DCD95C05B50"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:5.x-1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B4B1E6E6-1599-49E6-9ADA-3E6B436FDDE8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2F35D9CF-45FB-49CF-8246-584FD30D3F80"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FBA3DFF2-7F61-41B0-92B9-7C3F957A5CF8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9EE663F-EC06-448E-9682-E0782396C0AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7B5ABA62-B08B-4C0E-A54C-B2557D209A35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "42539489-E85A-413A-8196-E726B277776F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DA4C9B4B-41C8-4414-8484-E29B8A6EB945"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A1EC4C7-2327-4C5D-BB20-A8C35A193659"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BE9E10E1-7F0A-45A1-B357-075F924B4CD5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "75060E0E-A937-4DA2-A12B-297CC8A85A35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2E24BD37-2BBE-48C2-94F0-9BD667ABAAEE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB767686-6AF3-4984-8B1C-482E3BCEA10D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DE203571-F380-4784-875B-2BC6B3CD5F8F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE5ED195-87D9-42F0-AAB2-09C890C58A4A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8943480E-5723-40B7-82B2-724F132C8911"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E466D2D8-2689-4568-B71E-F672B74C58F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "14203628-6B66-455F-BFE3-498E521FB2EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C89017C5-2C36-4BA6-BA5B-75F8D9776E35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04F0CC90-0F52-46DD-B142-5E9CF57E433C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "71B21D8A-2E51-4967-8F8F-3E385EB68A63"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.19:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC4266FD-FA2D-4B3B-9F8F-867B93B08E5A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://drupal.org/node/874116",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://drupal.org/node/874130",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://drupal.org/node/874132",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/66889",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/40844",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/42231",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60905",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://drupal.org/node/874116",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://drupal.org/node/874130",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://drupal.org/node/874132",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/66889",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/40844",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/42231",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60905",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |