René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

208 lines
6.4 KiB
JSON

{
"id": "CVE-2009-4187",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-12-03T17:30:02.203",
"lastModified": "2009-12-04T05:00:00.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the Gateway component in Sun Java System Portal Server 6.3.1, 7.1, and 7.2 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de comandos en sitios cruzados(XSS) en el componente Gateway en Sun Java System Portal Server v6.3.1, v7.1, y v7.2 permite a atacantes remotos inyectar secuencias de comandos web o HTML de forma arbitraria."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:java_system_portal_server:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A29331A7-9D72-489D-A8DF-5B4C18A19692"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:java_system_portal_server:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "83D63923-869B-4156-BBED-DFB417B19420"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:sun:solaris:9:*:sparc:*:*:*:*:*",
"matchCriteriaId": "14CFA6D3-A611-4DF0-97AB-C30B79833DFA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:sun:solaris:9:*:x86:*:*:*:*:*",
"matchCriteriaId": "F2F5901D-AB91-4F12-BF08-0BC3797833E8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*",
"matchCriteriaId": "7FBA68F0-4577-46F5-A754-D365B6EFF872"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*",
"matchCriteriaId": "E79CFAA6-A08A-4C70-A3D9-B02C29A17FF2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:java_system_portal_server:6.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5079DD4A-F14E-4ABD-B5DA-4DC75135EF5B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:sun:solaris:8:*:sparc:*:*:*:*:*",
"matchCriteriaId": "6DBDFD8C-371E-42D2-9635-D8CDD1775984"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:sun:solaris:8:*:x86:*:*:*:*:*",
"matchCriteriaId": "E2F84D4E-EFE1-4A4F-BB58-E665A9C307A0"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:sun:solaris:9:*:sparc:*:*:*:*:*",
"matchCriteriaId": "14CFA6D3-A611-4DF0-97AB-C30B79833DFA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:sun:solaris:9:*:x86:*:*:*:*:*",
"matchCriteriaId": "F2F5901D-AB91-4F12-BF08-0BC3797833E8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*",
"matchCriteriaId": "7FBA68F0-4577-46F5-A754-D365B6EFF872"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*",
"matchCriteriaId": "E79CFAA6-A08A-4C70-A3D9-B02C29A17FF2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:java_system_portal_server:6.3.1:*:linux:*:*:*:*:*",
"matchCriteriaId": "9701D793-7080-4272-B657-C17B5CEBE20C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:java_system_portal_server:7.1:*:linux:*:*:*:*:*",
"matchCriteriaId": "A67F6B05-8B6D-4C48-8094-01600589863E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:java_system_portal_server:7.2:*:linux:*:*:*:*:*",
"matchCriteriaId": "3BDF3AEA-DD1C-4BE1-A8B1-CEA5A5F6DFA5"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1023260",
"source": "cve@mitre.org"
},
{
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-138686-04-1",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-269368-1",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/37186",
"source": "cve@mitre.org"
}
]
}