René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

112 lines
3.7 KiB
JSON

{
"id": "CVE-2019-14478",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-12-16T17:15:12.890",
"lastModified": "2020-12-17T16:32:03.080",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "AdRem NetCrunch 10.6.0.4587 has a stored Cross-Site Scripting (XSS) vulnerability in the NetCrunch web client. The user's input data is not properly encoded when being echoed back to the user. This data can be interpreted as executable code by the browser and allows an attacker to execute JavaScript code in the context of the user's browser if the victim opens or searches for a node whose \"Display Name\" contains an XSS payload."
},
{
"lang": "es",
"value": "AdRem NetCrunch versi\u00f3n 10.6.0.4587, presenta una vulnerabilidad de tipo Cross-Site Scripting (XSS) almacenado en el cliente web NetCrunch. Los datos de entrada del usuario no son codificados apropiadamente cuando han sido devueltos al usuario. Estos datos pueden ser interpretados como c\u00f3digo ejecutable por el navegador y permite a un atacante ejecutar c\u00f3digo JavaScript en el contexto del navegador del usuario si la v\u00edctima abre o busca un nodo cuyo \"Display Name\" contiene una carga \u00fatil de tipo XSS"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adremsoft:netcrunch:10.6.0.4587:*:*:*:*:*:*:*",
"matchCriteriaId": "41BEC585-2FD8-49F7-87D6-566361EDB4D6"
}
]
}
]
}
],
"references": [
{
"url": "https://compass-security.com/fileadmin/Research/Advisories/2020-12_CSNC-2019-013_AdRem_NetCrunch_Cross-Site_Scripting_XSS.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.adremsoft.com/support/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}