2024-10-17 14:03:54 +00:00

88 lines
2.5 KiB
JSON

{
"id": "CVE-2024-27136",
"sourceIdentifier": "security@apache.org",
"published": "2024-06-24T08:15:09.297",
"lastModified": "2024-10-17T13:47:39.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "XSS in Upload page in Apache JSPWiki 2.12.1 and priors allows the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.2 or later. "
},
{
"lang": "es",
"value": "XSS en la p\u00e1gina de carga en Apache JSPWiki 2.12.1 y versiones anteriores permite al atacante ejecutar javascript en el navegador de la v\u00edctima y obtener informaci\u00f3n confidencial sobre la v\u00edctima. Los usuarios de Apache JSPWiki deben actualizar a 2.12.2 o posterior."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:jspwiki:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.12.2",
"matchCriteriaId": "4FF7A52D-F6D4-4D76-89B4-A2DEF52B4012"
}
]
}
]
}
],
"references": [
{
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2024-27136",
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://lists.apache.org/thread/gfms8gbncqqkj52p861b8fnsypwsl1d5",
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
}
]
}