mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
207 lines
7.4 KiB
JSON
207 lines
7.4 KiB
JSON
{
|
|
"id": "CVE-2011-4332",
|
|
"sourceIdentifier": "secalert@redhat.com",
|
|
"published": "2011-11-23T18:55:01.453",
|
|
"lastModified": "2011-11-28T05:00:00.000",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Joomla! 1.6.3 and earlier allow remote attackers to inject arbitrary web script or HTML via unspecified vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Joomla! v1.6.3 y anteriores, permiten a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.6.3",
|
|
"matchCriteriaId": "04C7A143-6E44-40FE-9339-DA4346A99E5A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:alpha:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C15380EB-6543-4C95-9B7F-35DDD99D1C37"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:alpha2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C95EE9E1-CB59-4E8B-B57B-991295790328"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:beta1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "605F893A-2612-4524-B24B-0468F5EE2019"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:beta10:*:*:*:*:*:*",
|
|
"matchCriteriaId": "21D252E2-1961-4D4F-8471-584CF6CB39E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:beta11:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B0930E8-3E98-4DF5-AED3-146D34F843D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:beta12:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C732CFEF-CF4D-4EB7-A730-A5764B40A9BC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:beta13:*:*:*:*:*:*",
|
|
"matchCriteriaId": "10880E1E-8478-485C-AD9C-ABE4C51D2EA7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:beta14:*:*:*:*:*:*",
|
|
"matchCriteriaId": "816A10B4-EC28-47EF-BD47-7F431AB77561"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:beta15:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F9085C7C-6CA0-4423-93B1-9E8AF6D2978E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:beta2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5BCAD021-E5B2-4232-81FF-BB04908F4FE6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:beta3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0B842E1A-348B-4644-930E-CF46E1E38E70"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:beta4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D08BB717-4841-482D-A1AD-E8DF769E57C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:beta5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "065980D5-AEBA-44B1-A58D-8BF8FFF674F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:beta6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBC711DC-C790-4558-B305-A812EE2290B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:beta7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "37DE1D53-EE34-4C2C-B2AD-3DD58254C874"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:beta8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E11C49B-2A3E-4D52-BEFA-CDDB751E20AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:beta9:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1D6CA7BE-DD88-4899-A284-C9E4F97F4005"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C686887-75D3-4682-AE61-245D10EEAADE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B15F42BC-7826-493B-8C5A-D70A7263DCB0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AAC6CF00-2D88-4B97-A496-DCBE1B4E9A00"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E5F713F-F7EF-4E9B-BEB1-DDFDA0838D22"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9774D211-08D9-4339-B2AE-42434DBAF169"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.6.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8C03B8F0-9A63-4896-A8CA-8CE829DE6B90"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://developer.joomla.org/security/news/349-20110601-xss-vulnerabilities.html",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2011/Nov/142",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.mavitunasecurity.com/xss-vulnerability-in-joomla-163/",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2011/11/21/29",
|
|
"source": "secalert@redhat.com"
|
|
}
|
|
]
|
|
} |