René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

144 lines
4.3 KiB
JSON

{
"id": "CVE-2021-31330",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-11T18:15:22.303",
"lastModified": "2022-05-20T14:19:38.790",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Scripting (XSS) vulnerability exists within Review Board versions 3.0.20 and 4.0 RC1 and earlier. An authenticated attacker may inject malicious Javascript code when using Markdown editing within the application which remains persistent."
},
{
"lang": "es",
"value": "Se presenta una vulnerabilidad de tipo cross-Site Scripting (XSS) en las versiones de Review Board 3.0.20 y 4.0 RC1 y anteriores. Un atacante autenticado puede inyectar c\u00f3digo Javascript malicioso cuando es usada la edici\u00f3n de Markdown dentro de la aplicaci\u00f3n, que permanece persistente"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:reviewboard:review_board:3.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "E05F0750-5ED6-498B-9D02-FB5E2923DDF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:reviewboard:review_board:4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "164701A1-0807-4CA7-8ACF-5FBB49D50BDB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:reviewboard:review_board:4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "29484465-C988-4306-915C-FDEA3EA74466"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:reviewboard:review_board:4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E580F564-2122-4C03-BFE9-6779562E57A8"
}
]
}
]
}
],
"references": [
{
"url": "https://mattschmidt.net/2021/04/14/review-board-xss-discovered/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.reviewboard.org/docs/releasenotes/reviewboard/3.0.21/",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://www.reviewboard.org/docs/releasenotes/reviewboard/4.0-rc-2/",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://www.reviewboard.org/news/2021/04/14/review-board-3-0-21-and-4-0-rc-2-security-bug-fixes-and-docker/",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}