mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
285 lines
10 KiB
JSON
285 lines
10 KiB
JSON
{
|
|
"id": "CVE-2009-0417",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-02-10T07:00:20.327",
|
|
"lastModified": "2024-11-21T00:59:51.510",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the AgaviWebRouting::gen(null) method in Agavi 0.11 before 0.11.6 and 1.0 before 1.0.0 beta 8 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with certain characters that are not properly handled by web browsers that do not strictly follow RFC 3986, such as Internet Explorer 6 and 7."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en el m\u00e9todo AgaviWebRouting::gen(null) en Agavi 0.11 anterior a v0.11.6 y v1.0 anterior v1.0.0 beta 8, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de una URL manipulada con ciertos caracteres que no son manejados adecuadamente por navegadores web que no siguen estrictamente el RFC 3986, como Internet Explorer 6 y 7."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"baseScore": 4.3,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D5632C8D-6BE4-4EA1-A195-75B65D6CCCD8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5298F6FA-FFB1-44F1-AA53-526A0A46AD3A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0920DDAB-14CE-482E-BE51-4CBC9A2FC5C3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.0:rc3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE9D3982-0B46-4D99-8B3C-61174EE1CD0C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.0:rc4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AF58F03B-C62D-4173-815B-39FCBF3A6364"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.0:rc5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "355EE49E-DD95-4EE9-A988-7161C4F79738"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.0:rc6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9410CE4-5BB2-49F1-A996-9FBE4326D9B5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.0:rc7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9E18D45-843B-4BB8-9BF7-5C2FC67B0CCD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2CED3C5-8A5D-4FA3-BE30-CAEDB8BB1029"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.1:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C6D4127B-31C7-43E5-83F7-B2857CB7EA99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.1:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1F1800B4-62E0-4B2E-99D7-F1A6C4E68D99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.1:rc3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7B5BCA3D-7642-4D3D-8FAB-980CCC23D199"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0DE90C4D-F2A8-4317-BB92-F7885A125672"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.2:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1D60E305-C39C-4982-9E9A-52E6DA872BCC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.2:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F465C91A-EDEB-4F81-8564-415041FAEB4B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBD6A720-337D-4AD7-BB51-3F02124BF2D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.3:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C9C8B70F-B03C-4F6D-ACCA-F7C5D716C202"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.3:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DA3B4E76-BF86-45BD-8EC6-B5614FACF3BA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FAD7CE36-8319-432A-98F5-CA014C577023"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.4:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04A8EBEF-1312-487B-B90E-75967FD011DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "376968EF-1EBE-406D-8D59-CE280A39CF0B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.5:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8D8294A9-32C1-4234-BE11-6C06C8C4E885"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC2DA0DA-0424-41E8-B999-FDE8034A2443"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.6:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DEFF8A61-0ADC-499C-968A-154F38904D49"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:0.11.6:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "25C9BC9D-8FB5-460F-8C9E-472B7AB2F57F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:1.0.0:beta1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3525B59A-F7B3-4D56-B2C0-5FE8AAA8F3CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:1.0.0:beta2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F8CBA3F9-043B-4F8C-89C6-834179ECBD70"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:1.0.0:beta3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E3D141D7-4714-4E86-AE15-12331BF50DF2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:1.0.0:beta4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B9937A6-37EF-43D4-877E-FBDDF3AF8BF6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:1.0.0:beta5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C162718B-8F33-49F6-B0E2-C1A2561C239C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:1.0.0:beta6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E5D29B16-C1EF-46C9-8C1E-0A76D62849D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agavi:agavi:1.0.0:beta7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B8769C6D-3C4F-4DC1-8A9D-B9430FA46F77"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://blog.agavi.org/post/75829956/agavi-0-11-6-released-fixes-vulnerability",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://blog.agavi.org/post/75830918/agavi-1-0-0-beta-8-released-fixes-vulnerability",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://trac.agavi.org/ticket/1019",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/33826",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://blog.agavi.org/post/75829956/agavi-0-11-6-released-fixes-vulnerability",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://blog.agavi.org/post/75830918/agavi-1-0-0-beta-8-released-fixes-vulnerability",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://trac.agavi.org/ticket/1019",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/33826",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |