mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-12-30 07:57:55 +00:00
171 lines
5.8 KiB
JSON
171 lines
5.8 KiB
JSON
{
|
|
"id": "CVE-2010-5097",
|
|
"sourceIdentifier": "secalert@redhat.com",
|
|
"published": "2012-05-21T20:55:16.553",
|
|
"lastModified": "2017-08-29T01:29:13.080",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the click enlarge functionality in TYPO3 4.3.x before 4.3.9 and 4.4.x before 4.4.5 when the caching framework is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la funcionalidad \"click enlarge\" de TYPO3 4.3.x anteriores a 4.3.9 y 4.4.x anteriores a 4.4.5. Cuando la plataforma de cach\u00e9 est\u00e1 habilitada, permite a atacantes remotos inyectar codigo de script web o c\u00f3digo HTML de su elecci\u00f3n a trav\u00e9s de vectores sin especificar."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 2.6
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 4.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6066CFA2-202E-43A3-B1DF-36364ABD5A1A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "13C922A9-05A3-4D98-A568-F780CCA87E39"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44E9893A-2771-4C04-9F90-B10EE659088E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "31DA3600-C955-46B0-8BD9-C9B3FC0B81EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C7ED0C04-33BA-4F9B-97B0-BB5D30C2A0D8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E40CC0D-E7EF-4800-AC0B-5AF603B8BC6F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16759F16-34C6-4C2C-BECB-12555EEEBDA3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBB331CC-3125-454E-BCBE-B85540B62110"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9B46AB0-D925-4E74-8D15-40EE3BC0B14A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "85F02502-5C03-4751-BC83-59F894400E7E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9319A96-D510-47DB-9DBC-C16C0947E4C9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "40E0FDF1-E63C-48C9-98E2-55E3FD891882"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E6D22400-E6A1-4C3A-B16F-E14672B86D14"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.4.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2DFA0996-4839-4FDB-9B9D-5F8424946F9A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2011/01/13/2",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2012/05/10/7",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2012/05/11/3",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2012/05/12/5",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/45470",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64178",
|
|
"source": "secalert@redhat.com"
|
|
}
|
|
]
|
|
} |