mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
64 lines
2.5 KiB
JSON
64 lines
2.5 KiB
JSON
{
|
|
"id": "CVE-2025-25612",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2025-03-17T15:15:43.907",
|
|
"lastModified": "2025-03-17T18:15:21.300",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "FS Inc S3150-8T2F prior to version S3150-8T2F_2.2.0D_135103 is vulnerable to Cross Site Scripting (XSS) in the Time Range Configuration functionality of the administration interface. An attacker can inject malicious JavaScript into the \"Time Range Name\" field, which is improperly sanitized. When this input is saved, it is later executed in the browser of any user accessing the affected page, including administrators, resulting in arbitrary script execution in the user's browser."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "FS Inc S3150-8T2F anterior a la versi\u00f3n S3150-8T2F_2.2.0D_135103 es vulnerable a cross site scripting (XSS) en la funci\u00f3n de configuraci\u00f3n de intervalo de tiempo de la interfaz de administraci\u00f3n. Un atacante puede inyectar JavaScript malicioso en el campo \"Nombre del intervalo de tiempo\", que no est\u00e1 correctamente depurado. Al guardar esta entrada, se ejecuta posteriormente en el navegador de cualquier usuario que acceda a la p\u00e1gina afectada, incluidos los administradores, lo que provoca la ejecuci\u00f3n de un script arbitrario en el navegador del usuario."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
|
"baseScore": 7.1,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://fs.com",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://github.com/secmuzz/CVE-2025-25612/",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |