mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
235 lines
9.2 KiB
JSON
235 lines
9.2 KiB
JSON
{
|
|
"id": "CVE-2012-0340",
|
|
"sourceIdentifier": "psirt@cisco.com",
|
|
"published": "2012-02-13T22:55:01.067",
|
|
"lastModified": "2024-11-21T01:34:49.677",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the management interface on the Cisco IronPort Encryption Appliance with software before 6.5.3 allows remote attackers to inject arbitrary web script or HTML via the header parameter to the default URI under admin/, aka bug ID 72410."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en la interfaz de administraci\u00f3n en Cisco IronPort Encryption Appliance con el software anterior a v6.5.3 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como ID del error 72410.\r\n"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"baseScore": 4.3,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "6.5.2.2",
|
|
"matchCriteriaId": "AA7FFE23-0AFF-4850-9028-C440FA7AE16E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:4.2.1-22.2.i386:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D2C22932-5F92-4D48-9C6F-C631B04B442B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:4.2.1-22.i386:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "966D3CC1-C574-49E2-9C9D-3F9402E3B213"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B06BD6BE-6FB2-4186-B919-F1882959A088"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A496017-D727-4303-A7FF-A7F40BC7E584"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "41DF7FFA-66B5-45E8-B57E-FB307E4DB8CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E3CAA06A-C849-49B9-B6B7-7E3BF41F705C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6539D9D7-E3DF-475C-B53D-CF11220FBA27"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7486F8C6-F2E5-4790-BA3A-FA36CF7A8704"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1262F096-DB00-4D52-894D-3BA812AEF570"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "097FCF52-65CF-4AF5-97BC-8B310610DFB9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F8A0A514-959C-4017-B0AB-AFC9D0A979E4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A06BEC91-C3A6-4590-94A7-EA783A12ABF9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FF9BCDE5-CEF8-4D25-AE6A-D4AF2B2DFBD0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "90A1B821-0FDD-40C8-93FA-06BB895E83D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9EF0B9B-B5D9-4F2D-A4E9-24349747435A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C9755041-EC3B-485D-B640-66659753BF66"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9651694A-ED57-4D76-8D2C-01D4388E56B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E081B0DF-DBD9-4640-92CC-29920E2A50BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C56BC79D-E974-4881-81E5-335FF216DFA2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4C7E4C7E-DECE-40B5-AAA4-15964F4EC762"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4686D0A4-85B4-4236-B09A-DA8B554A0523"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "25A2C919-CFE2-4CA5-94B0-4FE8F638D747"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4CF6D489-B7EA-4705-B136-6B96CC179046"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "391503D9-FE43-4A34-A67D-AB3B52996FA0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0180415E-8C75-4531-B5DA-8A24E37D4829"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C3D76E3-666B-4AC5-992F-75BE8EE4EB4F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D552797-A1A7-4500-8AF7-173732D7FBD2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=25045",
|
|
"source": "psirt@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.secureworks.com/research/advisories/SWRX-2012-001/",
|
|
"source": "psirt@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=25045",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.secureworks.com/research/advisories/SWRX-2012-001/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
],
|
|
"evaluatorComment": "Additional information can be found at: \nhttp://www.secureworks.com/research/advisories/SWRX-2012-001/"
|
|
} |