2024-11-22 07:15:30 +00:00

156 lines
4.7 KiB
JSON

{
"id": "CVE-2007-5058",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-09-24T22:17:00.000",
"lastModified": "2024-11-21T00:37:02.523",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the Web administration interface in Barracuda Spam Firewall before firmware 3.5.10.016 allows remote attackers to inject arbitrary web script or HTML via the username field in a login attempt, which is not properly handled when the Monitor Web Syslog screen is open."
},
{
"lang": "es",
"value": "Una vulnerabilidad de tipo cross-site scripting (XSS) en la interfaz de administraci\u00f3n Web en Barracuda Spam Firewall versiones de firmware anteriores a 3.5.10.016, permite a atacantes remotos inyectar script web o HTML arbitrario por medio del campo username en un intento de inicio de sesi\u00f3n, que no es manejado apropiadamente cuando la pantalla Monitor Web Syslog est\u00e1 abierta."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.4.10.102",
"matchCriteriaId": "B90F7741-C97A-49DA-A45B-A7B7344081D3"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/38156",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/26937",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/3164",
"source": "cve@mitre.org"
},
{
"url": "http://www.barracudanetworks.com/ns/support/tech_alert.php",
"source": "cve@mitre.org"
},
{
"url": "http://www.infobyte.com.ar/adv/ISR-15.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/480238/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/25757",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1018733",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/3257",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36716",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/38156",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/26937",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://securityreason.com/securityalert/3164",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.barracudanetworks.com/ns/support/tech_alert.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.infobyte.com.ar/adv/ISR-15.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/480238/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/25757",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id?1018733",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2007/3257",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36716",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}