mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
172 lines
6.3 KiB
JSON
172 lines
6.3 KiB
JSON
{
|
|
"id": "CVE-2009-3300",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-11-06T15:30:00.467",
|
|
"lastModified": "2017-08-17T01:31:04.600",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the Identity Provider (IdP) 1.3.x before 1.3.4 and 2.x before 2.1.5, and the Service Provider 1.3.x before 1.3.5 and 2.x before 2.3, in Internet2 Middleware Initiative Shibboleth allow remote attackers to inject arbitrary web script or HTML via URLs that are encountered in redirections, and appear in automatically generated forms."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Identity Provider (IdP) v1.3.x anteriores a v1.3.4 y v2.x anteriores a v2.1.5, y el Service Provider v1.3.x anteriores a v1.3.5 y v2.x anteriores a v2.3, en Internet2 Middleware Initiative Shibboleth permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante URLs que se encuentran en redirecciones, y aparecen en formularios generados autom\u00e1ticamente."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 2.6
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 4.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:identity_provider:1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C8F4FDCC-6F62-46B3-BDE4-47E97C42A8BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:identity_provider:1.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E506CFD-FA07-4AF2-B5D0-E2445CE8E187"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:identity_provider:1.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BAD4C302-0D8A-4D87-A221-AEA7860AFBB5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:identity_provider:1.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F79E5936-403C-4B39-BF9E-D2CE37BF0FB6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:identity_provider:2.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E860B355-440B-42B0-8529-E61B5906EDCF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:identity_provider:2.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "983E964B-7EED-4CD7-9008-65CF4F7F9267"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:identity_provider:2.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ABEDD8A8-7178-4147-8AF8-E01DFDE3695C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:identity_provider:2.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "381F5C77-56C3-4423-BEDD-03D6D9A36904"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:identity_provider:2.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "439E3E35-657A-4DF2-8448-6A83C24E38AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:service_provider:1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4FBF9D0E-7284-48A3-86B8-13B939A0122C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:service_provider:1.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B580FD0A-623A-4B8B-9FF2-521761C7DAFB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:service_provider:1.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "383415FC-3B9D-435E-B492-D906E8C2B9E0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:service_provider:1.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C5DC9602-44EB-433D-99BB-2BA487E1B441"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:service_provider:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1D1747D4-FD56-4635-8C0C-CC56C95A09E4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:service_provider:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F800773B-4EC2-4409-856D-4827A9FDEEA8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:internet2:service_provider:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "23335793-69A9-44C3-9EC9-2D5486B7010D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://shibboleth.internet2.edu/secadv/secadv_20091104.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2009/dsa-1947",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2009/3150",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54140",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |