René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

190 lines
6.8 KiB
JSON

{
"id": "CVE-2008-6127",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-02-13T18:30:04.547",
"lastModified": "2017-08-17T01:29:03.677",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in moziloCMS 1.10.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) page and (2) query parameters to (a) index.php, (3) cat and (4) file parameters to (b) download.php, (5) gal parameter to gallery.php, and the (6) URL to admin/login.php."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en moziloCMS v1.10.2 y versiones anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante los par\u00e1metros (1) \"page\" y (2) \"query\" en (a) index.php, los par\u00e1metros (3) \"cat\" y (4) \"file\" en download.php, el par\u00e1metro (5) \"gal\" en gallery.php, y el par\u00e1metro (6) \"URL\" en admin/login.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.10.2",
"matchCriteriaId": "1D5DDCB8-620E-44DC-B825-EF85976E2CA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A28C98-5441-445B-A7CB-0C8F7138740D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "61F5FDDC-518A-453E-B1AC-95ECC3989BFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "94E2EBB2-FE02-484B-BEE5-8CE9BAD93887"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9495618C-29B8-4F10-B77B-C8D919AC4CEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "42A75118-9B2B-45B4-B57C-6819B840B827"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "61D1F62A-FC84-45DB-886A-1FFB1848EE97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5D1EFC37-2184-4A84-81E0-3597294B54C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A2A82F17-9C66-4F40-96E8-B9576A365F59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "07652C42-504F-4569-8A8A-0FAB9B4E5554"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "637F8421-B65C-493B-95E4-4E0E9CF7598F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "42695686-EC6D-4973-98F1-66426FBB3BBB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6E9FF4E4-6411-436E-B2C2-B9D1DA264519"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "770D73A4-E544-4CC0-9601-B7B6ACB2C287"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "66047271-B38F-469B-8B91-4A0C16529C30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3BA5E5D6-279A-408C-BCAE-F2EF73D46905"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FD6C096C-9388-4A46-8280-58B3F6C4495B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1B5AD3FB-BC81-4DFE-9AF3-00263C558051"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9A6B5902-B199-4203-A385-16CDBBA63A29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilo:mozilocms:1.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "362E7D45-EA25-47D8-A42C-E8CBA78C0D1B"
}
]
}
]
}
],
"references": [
{
"url": "http://cms.mozilo.de/index.php?cat=10_moziloCMS&page=60_Changelog",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/31495",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45525",
"source": "cve@mitre.org"
}
]
}