2024-12-08 03:06:42 +00:00

154 lines
4.5 KiB
JSON

{
"id": "CVE-2010-4886",
"sourceIdentifier": "cve@mitre.org",
"published": "2011-10-07T10:55:09.377",
"lastModified": "2024-11-21T01:21:59.690",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the \"official twitter tweet button for your page\" (tweetbutton) extension before 1.0.5 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en la extensi\u00f3n \"official twitter tweet button for your page\" (tweetbutton) anteriores a v1.0.5 para TYPO3, permite a atacantes remotos ejecutar secuencias de comandos web y HTML a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:peter_proell:tweetbutton:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0.4",
"matchCriteriaId": "993DDE43-A1A5-468A-85E7-65D76BB15FAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:peter_proell:tweetbutton:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4B24728A-A7F8-4ABF-A176-B2B7526968DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:peter_proell:tweetbutton:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C1270123-CC33-4FBA-8DEA-2C2262660D19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:peter_proell:tweetbutton:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7BD8C425-0BCF-4143-BB0C-FAFAF4447B7C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F1C59B0-CDF2-4F9A-88C7-61E8F18590DB"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/41268",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://typo3.org/extensions/repository/view/tweetbutton/1.0.5/",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-018/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/42941",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/41268",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://typo3.org/extensions/repository/view/tweetbutton/1.0.5/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-018/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/42941",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}