René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

165 lines
5.1 KiB
JSON

{
"id": "CVE-2015-8975",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-01-31T22:59:00.237",
"lastModified": "2017-02-03T16:12:11.387",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the error handler in MyBB (aka MyBulletinBoard) before 1.6.18 and 1.8.x before 1.8.6 and MyBB Merge System before 1.8.6 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de XSS en el manejador de errores en MyBB (tambi\u00e9n conocido como MyBulletinBoard) en versiones anteriores a 1.6.18 y 1.8.x en versiones anteriores a 1.8.6 y MyBB Merge System en versiones anteriores a 1.8.6 podr\u00eda permitir a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mybb:merge_system:1.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "84DB6EE0-4972-434D-9C89-7BD9EB4896B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.6.17",
"matchCriteriaId": "2FF6F484-A280-45A6-BB5E-B923339B7109"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mybb:mybb:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E697D13C-5594-491B-B911-3B4BEA00AFCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mybb:mybb:1.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "00724054-858F-4322-8BE5-F6929CC2CAD8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mybb:mybb:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "95998F68-1F16-4FEA-BDE3-957235D04881"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mybb:mybb:1.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "927F9547-773B-4F2C-8870-AA3672EEC7CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mybb:mybb:1.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6817FA9E-51B7-4ADE-86E2-E9F559A585EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mybb:mybb:1.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "667EFFF1-E5C1-4124-BD0B-D4244FAECE15"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2016/11/10/8",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2016/11/18/1",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/94397",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://blog.mybb.com/2015/09/07/mybb-1-8-6-1-6-18-merge-system-1-8-6-release/",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}