René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

122 lines
3.7 KiB
JSON

{
"id": "CVE-2017-15215",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-10-11T01:32:55.317",
"lastModified": "2017-10-27T18:53:15.213",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Reflected XSS vulnerability in Shaarli v0.9.1 allows an unauthenticated attacker to inject JavaScript via the searchtags parameter to index.php. If the victim is an administrator, an attacker can (for example) take over the admin session or change global settings or add/delete links. It is also possible to execute JavaScript against unauthenticated users."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Scripting (XSS) reflejado permite que un atacante sin identificar inyecte JavaScript mediante el par\u00e1metro searchtags en index.php. Si la v\u00edctima es un administrador, un atacante puede (por ejemplo) tomar el control de la sesi\u00f3n de administrador o cambiar configuraciones globales o a\u00f1adir/borrar enlaces. Tambi\u00e9n es posible ejecutar JavaScript contra usuarios sin autenticar."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:shaarli_project:shaarli:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8064EA18-3EAA-45D1-81EC-B7C52DD85D63"
}
]
}
]
}
],
"references": [
{
"url": "http://openwall.com/lists/oss-security/2017/10/07/2",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/shaarli/Shaarli/pull/987",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/shaarli/Shaarli/releases/tag/v0.9.2",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
]
}
]
}