René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

129 lines
4.8 KiB
JSON

{
"id": "CVE-2008-1972",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-04-27T18:05:00.000",
"lastModified": "2017-08-08T01:30:38.713",
"vulnStatus": "Modified",
"evaluatorSolution": "Patch Link: http://www.exponentcms.org/index.php?action=view&id=64&module=newsmodule&src=%40random44fe03276195",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the user account creation feature in Exponent CMS 0.96.6-GA20071003 and earlier, when the Allow Registration? configuration option is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) username, (2) firstname, (3) lastname, and (4) e-mail address fields. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en la caracter\u00edstica creaci\u00f3n de la cuenta de usuario en Exponent CMS 0.96.6-GA20071003 y versiones anteriores, cuando la opci\u00f3n de configuraci\u00f3n Allow Registration? est\u00e1 activa, permiten a atacantes remotos inyectar web script o HTML de su elecci\u00f3n a trav\u00e9s de los campos (1) username, (2) firstname, (3) lastname, y (4) e-mail address.\r\nNOTA: algunos de estos detalles han sido obtenidos a partir de la informaci\u00f3n de terceros.\r\n\r\n"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oicgroup:exponent_cms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.96.6-ga20071003",
"matchCriteriaId": "6F95BE89-FAB8-4837-8FD2-F62760C70911"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oicgroup:exponent_cms:0.94:*:*:*:*:*:*:*",
"matchCriteriaId": "195E44F8-A725-488D-B48D-B9D35195E716"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oicgroup:exponent_cms:0.95:*:*:*:*:*:*:*",
"matchCriteriaId": "6B58BF21-749F-4FA8-BBFF-6CE46017C236"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oicgroup:exponent_cms:0.96.1:*:*:*:*:*:*:*",
"matchCriteriaId": "294437EA-5F43-4FFD-BAA4-885A00DDE08D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oicgroup:exponent_cms:0.96.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FBFDA38A-EC14-4257-9078-4166CA21DB8E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oicgroup:exponent_cms:0.96.4:*:*:*:*:*:*:*",
"matchCriteriaId": "61A88451-9D03-4509-9E14-6916F8B7E4F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oicgroup:exponent_cms:0.96.5:rc1:*:*:*:*:*:*",
"matchCriteriaId": "26134569-3328-4275-863A-1DFCE9629B73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oicgroup:exponent_cms:0.96.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A1B2F711-6E9C-4DC5-8883-9522331FA608"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oicgroup:exponent_cms:0.96.6:alpha:*:*:*:*:*:*",
"matchCriteriaId": "4C4C3D9D-115A-4ABE-B638-91529F455D45"
}
]
}
]
}
],
"references": [
{
"url": "http://sourceforge.net/project/shownotes.php?release_id=592961&group_id=118524",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/28834",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41878",
"source": "cve@mitre.org"
}
]
}