2024-12-08 03:06:42 +00:00

206 lines
5.9 KiB
JSON

{
"id": "CVE-2010-1905",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-05-12T11:46:31.547",
"lastModified": "2024-11-21T01:15:26.020",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance allow remote attackers to inject arbitrary web script or HTML via crafted input to ASP pages, as demonstrated using the backurl parameter to sdccommon/verify/asp/n6plugindestructor.asp."
},
{
"lang": "es",
"value": "Multiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Consona Live Assistance, Dynamic Agent, y Subscriber Assistance\r\npermiten a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de entradas manipuladas a las p\u00e1ginas ASP, como se ha demostrado mediante el par\u00e1metro backurl a sdccommon/verify/asp/n6plugindestructor.asp."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:consona:consona_live_assistance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD3CC62-BB8B-435F-A9F3-CD6DE608F463"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:consona:consona_dynamic_agent:-:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "3E86DC4D-1E5C-4284-AA49-FD5F3AA9056A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:consona:consona_dynamic_agent:-:-:marketing:*:*:*:*:*",
"matchCriteriaId": "76A93E2B-D458-43A4-A4A5-9FA0981B72EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:consona:consona_dynamic_agent:-:-:support:*:*:*:*:*",
"matchCriteriaId": "F1AAF4CD-3D1A-4C44-8338-4F614E4645CB"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:consona:consona_subscriber_assistance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F445B64-34D5-4372-9861-2216442E4069"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/39740",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://wintercore.com/en/component/content/article/7-media/18-wintercore-releases-an-advisory-for-consona-products.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.consona.com/Content/CRM/Support/SecurityBulletin_April2010.pdf",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/602801",
"source": "cve@mitre.org",
"tags": [
"Patch",
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/archive/1/511176/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/39999",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.wintercore.com/downloads/rootedcon_0day.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://secunia.com/advisories/39740",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://wintercore.com/en/component/content/article/7-media/18-wintercore-releases-an-advisory-for-consona-products.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.consona.com/Content/CRM/Support/SecurityBulletin_April2010.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/602801",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/archive/1/511176/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/39999",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.wintercore.com/downloads/rootedcon_0day.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}