2024-12-08 03:06:42 +00:00

199 lines
7.1 KiB
JSON

{
"id": "CVE-2010-1649",
"sourceIdentifier": "secalert@redhat.com",
"published": "2010-06-08T00:30:01.600",
"lastModified": "2024-11-21T01:14:53.140",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the back end in Joomla! 1.5 through 1.5.17 allow remote attackers to inject arbitrary web script or HTML via unknown vectors related to \"various administrator screens,\" possibly the search parameter in administrator/index.php."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de comandos en sitios cruzados(XSS) en el backend de Joomla! v1.5 a v1.5.17 permiten a atacantes remotos inyectar HTML o secuencias de comandos web a trav\u00e9s de vectores desconocidos relacionados con \"varias pantallas de administrador\". Posiblemente se trate del par\u00e1metro de b\u00fasqueda en administrator/index.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "65184BFE-A070-4099-B672-3A238E9F83EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "920129E4-F979-49B5-9B96-62BCBC3954D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1313BEAD-C0C0-4D8C-A3AA-F514BA6A1C92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A90A8900-E441-46C4-A725-BA312358760E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E74E276C-C62D-4828-89CB-80F526FEAEA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F370EA7F-3719-4D35-A7FD-C7AD1BD709D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E4E48636-9EDB-49BB-ABC8-D79864BFCB38"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "580712F4-E97C-4E3F-BF9D-3445BEB4C3FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "466E5E84-4C69-49F2-83DA-FC86202DB7F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CB968DF7-4A0B-474C-8639-06976837E03D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1B6BE010-649F-4E48-97DC-DDF7511406D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2B8C4094-D028-4A55-B523-C90F5A4C9D82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "69FA6550-2135-4D41-B592-433FFFDEE180"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "C73D78E0-BF24-433B-9F1B-03FD956C5779"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BAC75B-DAC1-47E1-B9C9-48CF19489143"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "9BA97C8A-809D-44FC-95D2-5F269B6BF77D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "883B3DC0-6D6C-4C21-BC2A-EE53C140D817"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B7CFCF0F-BCD9-4215-817A-1409EA00CCBA"
}
]
}
]
}
],
"references": [
{
"url": "http://developer.joomla.org/security/news/314-20100501-core-xss-vulnerabilities-in-back-end.html?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+JoomlaSecurityNews+%28Joomla%21+Security+News%29",
"source": "secalert@redhat.com"
},
{
"url": "http://secunia.com/advisories/39964",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.osvdb.org/65011",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/bid/40444",
"source": "secalert@redhat.com"
},
{
"url": "http://developer.joomla.org/security/news/314-20100501-core-xss-vulnerabilities-in-back-end.html?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+JoomlaSecurityNews+%28Joomla%21+Security+News%29",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/39964",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.osvdb.org/65011",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/40444",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}