René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

124 lines
4.0 KiB
JSON

{
"id": "CVE-2015-2944",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2015-06-02T14:59:09.863",
"lastModified": "2021-04-09T15:15:17.437",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Sling API before 2.2.2 and Apache Sling Servlets Post before 2.1.2 allow remote attackers to inject arbitrary web script or HTML via the URI, related to (1) org/apache/sling/api/servlets/HtmlResponse and (2) org/apache/sling/servlets/post/HtmlResponse."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de XSS en Apache Sling API anterior a 2.2.2 y Apache Sling Servlets Post anterior a 2.1.2 permiten a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTML a trav\u00e9s de la URI, relacionado con (1) org/apache/sling/api/servlets/HtmlResponse y (2) org/apache/sling/servlets/post/HtmlResponse."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:sling_api:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.2.0",
"matchCriteriaId": "E07C591D-0BB6-4AFD-8F0A-8C0DDC6EC916"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:sling_servlets_post:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.1.0",
"matchCriteriaId": "4436136C-E124-40CE-8B4D-C824CBAEADDD"
}
]
}
]
}
],
"references": [
{
"url": "http://jvn.jp/en/jp/JVN61328139/index.html",
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000069",
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74839",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://issues.apache.org/jira/browse/SLING-2082",
"source": "vultures@jpcert.or.jp",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://lists.apache.org/thread.html/r04237d561f3e5bced0a26287454450a34275162aa6b1dbae1b707b31@%3Cdev.sling.apache.org%3E",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://lists.apache.org/thread.html/r4f41dd891a52133abdbf7f74ad1dde80c46f157c1f1cf8c23ba60a70@%3Cdev.sling.apache.org%3E",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://lists.apache.org/thread.html/r93d68359eb0ea8c0f26d71ca3998143f99209a24db7b4dacfc688cea@%3Cdev.sling.apache.org%3E",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://lists.apache.org/thread.html/rd2a352858630721e7b1655bbdf85e692d6156fcfe68109e12b017b16@%3Cdev.sling.apache.org%3E",
"source": "vultures@jpcert.or.jp"
}
]
}