2024-12-08 03:06:42 +00:00

151 lines
4.3 KiB
JSON

{
"id": "CVE-2006-4109",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-08-14T20:04:00.000",
"lastModified": "2024-11-21T00:15:10.980",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Bibliography (biblio.module) 4.6 before revision 1.1.1.1.4.11 and 4.7 before revision 1.13.2.5 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Bibliography (biblio.module 4.6 anterior a la revisi\u00f3n 1.1.1.1.4.11 y 4.7 anterior a la revisi\u00f3n 1.13.2.5 para Drupal permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:bibliography_module:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.5",
"matchCriteriaId": "742A15F9-111D-40C8-A1ED-9D8C175AC5A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:bibliography_module:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.6_rev1.1.1.1.4.10",
"matchCriteriaId": "EF7FC735-9298-4A2A-A3B4-F446EEA2F71B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:bibliography_module:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.7_rev1.13.2.4",
"matchCriteriaId": "8EA906ED-0CCA-4047-B88A-DCE7160C9AE7"
}
]
}
]
}
],
"references": [
{
"url": "http://drupal.org/node/77756",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/21435",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/19441",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/3227",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28295",
"source": "cve@mitre.org"
},
{
"url": "http://drupal.org/node/77756",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/21435",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/19441",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/3227",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28295",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}