mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
375 lines
13 KiB
JSON
375 lines
13 KiB
JSON
{
|
|
"id": "CVE-2011-1949",
|
|
"sourceIdentifier": "secalert@redhat.com",
|
|
"published": "2011-06-06T19:55:02.160",
|
|
"lastModified": "2024-11-21T01:27:22.217",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the safe_html filter in Products.PortalTransforms in Plone 2.1 through 4.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2010-2422."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Filtro safe_html en Products.PortalTransforms de Plone v2.1 hasta v4.1, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados, vulnerabilidad diferente de CVE-2010-2422.\r\n"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"baseScore": 3.5,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 6.8,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08747064-EC22-40B4-92EF-4640788FE55D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:2.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A4EB85E3-9A76-4B79-AF7D-91484784A2EF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:2.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78755057-2613-4D5E-8F59-2C117EE282B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:2.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D49359CD-63EF-4D3A-92DC-C16DEE88138B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:2.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9DE940BA-B784-4193-AB77-333F15B6C32D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9762C674-380B-4831-BBA1-3B27742121B0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3D938645-80CE-4287-830E-A3BD0C5C84FB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:2.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB0F7BFC-DC20-46B3-90E7-264E3A8A7886"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:2.5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F2C09C10-AEA0-41F4-B964-507B40580BE9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7B60568E-A688-46AF-B627-062A029A7324"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B635DAD-AC53-4484-8750-200B662DAFD1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0B647E76-E8B8-4329-8848-3B90EB262807"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D0A6B8F-4018-44DC-9862-45309619DC6D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F10374F-2BB3-48D2-B19F-9B2D038A8E35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FEAC4F93-D26C-48F3-A7FF-8DC008FC2671"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "552661B7-093D-4B3C-8770-FCDE6032AA17"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5180F9D2-E44B-455D-968C-792026AC832A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "636226E4-B880-41FE-A727-EF56CF8E6249"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF6E934A-C344-4861-8CD4-D18D52672D5C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "25780BBE-8013-4100-9EA8-7EFC244399A0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A089ED64-07E6-4F4C-97AE-AF74269A4DB1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EF2334C9-9B34-4C7D-93A2-172E596E05C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "354046F4-FA55-4AFC-935A-C803D36CDE86"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.1.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DF1496A7-6D0A-4970-B0BF-83758065BC6A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "47DEF57C-92F0-4999-AF8E-CEE27EE92CD6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4BED4241-D823-402A-A389-7E52C410E2F7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE9A55E6-F265-4BB8-8683-3E0CFA01EC73"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "970FD910-50A4-478A-ADE6-EB912C261DAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A490523-1063-44E4-A72A-C23070279181"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D8559F17-63D1-45DB-8A28-47F729DC6686"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FDC93803-6506-4382-A013-18010EE7E06B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E65977FD-A880-4D16-B56B-94A72774F42D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4EA5B4F8-2155-403D-97D8-1272285D508B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A3CA2943-77E5-4384-A019-415BBCE62F94"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7FF63F6-F1DC-4A97-A2E6-11CF613A31E8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "538A3519-5B04-4FE5-A3C0-FD26EFA32705"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F3306D84-0F5B-46BA-9BCC-DCD0A1CDD604"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E08F4534-A588-463F-A745-39E559AB1CB8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B64341BA-5722-415E-9771-9837168AB7C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2929227-AE19-428D-9AC3-D312A559039B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3B6DC866-0FEE-475B-855C-A69E004810CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "50BF3E8E-152C-4E89-BAA2-A952D10F4611"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "49DB97A7-89DD-43C0-A490-84AA7069764B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7C44B53B-953B-4522-A5B4-11573850D2CD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://osvdb.org/72728",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://plone.org/products/plone/security/advisories/CVE-2011-1949",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/44775",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/44776",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securityreason.com/securityalert/8269",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/518155/100/0/threaded",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/48005",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67694",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/72728",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://plone.org/products/plone/security/advisories/CVE-2011-1949",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/44775",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/44776",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securityreason.com/securityalert/8269",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/518155/100/0/threaded",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/48005",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67694",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |