mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
154 lines
5.5 KiB
JSON
154 lines
5.5 KiB
JSON
{
|
|
"id": "CVE-2015-6810",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2015-09-04T15:59:08.273",
|
|
"lastModified": "2015-09-04T18:59:04.197",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in Invision Power Services IPS Community Suite (aka Invision Power Board, IPB, or Power Board) 4.x before 4.0.12.1 allows remote authenticated users to inject arbitrary web script or HTML via the event_location[address] array parameter to calendar/submit/."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de XSS en Invision Power Services IPS Community Suite (tambi\u00e9n conocido como Invision Power Board, IPB o Power Board) 4.x en versiones anteriores a 4.0.12.1, permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del par\u00e1metro del vector event_location[address] a calendar/submit/"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 3.5
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 6.8,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7DC9976C-50BC-42D5-A29C-F8D9A242FEB4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DBDF76B0-0DA8-4A00-B319-8C0AAFE3997A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDD7C3F7-FB78-49B2-9569-0994168348F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C2F605B7-0840-445A-9D9B-7A31F3BBE015"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E907E62-8F84-4696-9211-68CFCD33ABCD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C24EECA2-2B2C-4E4F-8D98-A14CEEA55AA5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.6.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7655C20B-4483-43D0-956F-7426FDDDAF2A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6D5A96CB-34D0-46B6-8E1E-F7F17091BCA8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1B399679-181B-4305-9256-CCF32E93ADE7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.8.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBEC8363-7FF1-4BB2-9BFB-07319391E511"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.9.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "272661E2-353B-42D9-A649-42C1D8B5159C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.10.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1CA019FF-A917-473B-9EB6-349CA512173D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "30483016-BB5F-4101-92AB-B26AA2A65596"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A0D11EAA-35B1-4944-9982-087A1EB88710"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://community.invisionpower.com/release-notes/40121-r22/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.exploit-db.com/exploits/37989/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
}
|
|
]
|
|
} |