René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

107 lines
3.5 KiB
JSON

{
"id": "CVE-2019-4409",
"sourceIdentifier": "psirt@hcl.com",
"published": "2019-10-18T20:15:09.723",
"lastModified": "2019-10-30T13:54:30.717",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "HCL Traveler versions 9.x and earlier are susceptible to cross-site scripting attacks. On the Problem Report page of the Traveler servlet pages, there is a field to specify a file attachment to provide additional problem details. An invalid file name returns an error message that includes the entered file name. If the file name is not escaped in the returned error page, it could expose a cross-site scripting (XSS) vulnerability."
},
{
"lang": "es",
"value": "HCL Traveler versiones 9.x y anteriores, son susceptibles a ataques de tipo cross-site scripting. En la p\u00e1gina Problem Report de las p\u00e1ginas del servlet de Traveler, existe un campo para especificar un archivo adjunto que provee detalles adicionales del problema. Un nombre de archivo no v\u00e1lido devuelve un mensaje de error que incluye el nombre de archivo ingresado. Si el nombre del archivo no es escapado en la p\u00e1gina de error devuelta, podr\u00eda exponer una vulnerabilidad de tipo cross-site scripting (XSS)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:traveler:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.0.0",
"matchCriteriaId": "FFA1411A-B0DF-45CD-9E9E-56D9BBB63F4D"
}
]
}
]
}
],
"references": [
{
"url": "https://hclpnpsupport.hcltech.com/csm?id=kb_article&sysparm_article=KB0073231",
"source": "psirt@hcl.com",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
]
}
]
}