mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
127 lines
4.3 KiB
JSON
127 lines
4.3 KiB
JSON
{
|
|
"id": "CVE-2011-0767",
|
|
"sourceIdentifier": "cret@cert.org",
|
|
"published": "2011-06-06T19:55:01.427",
|
|
"lastModified": "2017-08-17T01:33:43.993",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the management GUI in the MX Management Server in Imperva SecureSphere Web Application Firewall 6.2, 7.x, and 8.x allows remote attackers to inject arbitrary web script or HTML via an HTTP request to a firewalled server, aka Bug ID 31759."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en el GUI de control de MX Management Server en Imperva SecureSphere Web Application Firewall v6.2, 7.x, y 8.x , permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de una petici\u00f3n HTTP a un servidor filtrado, cambien conocido como Bug ID 31759."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:imperva:securesphere_web_application_firewall:6.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "51641749-DDD9-4744-BA7D-8B99B4BCC32D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:imperva:securesphere_web_application_firewall:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1467CB0D-598C-4582-AED6-233F73EB8378"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:imperva:securesphere_web_application_firewall:7.0.0.7061:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DD39B83F-25B7-4674-A4B8-7EBDCD3EC611"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:imperva:securesphere_web_application_firewall:7.0.0.7078:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F11F0459-AA27-4892-AA26-F2BCB7CB3B1C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:imperva:securesphere_web_application_firewall:7.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "327D03E6-1F83-4231-A110-26A3F72C9827"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:imperva:securesphere_web_application_firewall:8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6DA8B34D-FF53-4391-BD0F-EC5FFB6DBDDE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:imperva:securesphere_web_application_firewall:8.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "151D0049-15A0-4D1B-A6E8-52830618289B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.imperva.com/resources/adc/adc_advisories_response_secureworks.html",
|
|
"source": "cret@cert.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/567774",
|
|
"source": "cret@cert.org",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.secureworks.com/research/advisories/SWRX-2011-001/",
|
|
"source": "cret@cert.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67779",
|
|
"source": "cret@cert.org"
|
|
}
|
|
]
|
|
} |