2024-12-08 03:06:42 +00:00

222 lines
7.2 KiB
JSON

{
"id": "CVE-2013-7077",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-12-21T00:55:04.580",
"lastModified": "2024-11-21T02:00:17.860",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the Backend User Administration Module in TYPO3 6.0.x before 6.0.12 and 6.1.x before 6.1.7 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad cross-site scripting (XSS) en Backend User Administration Module de TYPO3 6.0.x anteriores a 6.0.12 y 6.1.x anteriores a 6.1.7 permite a atacantes remotos inyectar script web o HTML de forma arbitraria a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "84C095F8-000A-4A8D-81DE-047810345A15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "976AAF6F-BF03-40B7-B7D2-22101BD857D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6E98D0D9-D9AE-44F7-8233-F92EB330B152"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "36EA784A-7C3A-41DA-B444-D01E3BC144BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7294AA8B-0CD3-47A2-91DC-A882F7F3BDFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4D28DD85-FBB3-4DD4-B525-7AFD32BE55F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "80C21E07-5083-4C86-AA9D-FCB73F636060"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5DAE1BB4-2DBD-489E-B3F9-88CF414EAC2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "0724FE19-F0A4-4055-996A-2B7844CAC426"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A862C28E-B1B9-4541-A559-D0BD16E575B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EA1DE94A-DDCD-4067-A0C0-16904F6B7EC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7C6DD4A1-C865-4AC8-86BC-8F92319F33A3"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C140F242-CF7C-4CB6-A358-5C8DB0F26DAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "81EAC0BA-B6AC-42BA-AEEE-946E1FBD770B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD31180A-8BD6-49AC-A758-5FA4C9A7B4C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E06A3B0C-364F-42A3-803B-6CE1EAB386C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "692DE690-C921-403B-9966-60CB23FF5D02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "94C181FE-F3A9-4C7E-955F-0CCD4E6B4DAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:6.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "11DD1626-884F-40EE-9721-2FCF7F14F781"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/100884",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/oss-sec/2013/q4/473",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/oss-sec/2013/q4/487",
"source": "cve@mitre.org"
},
{
"url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89626",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/100884",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://seclists.org/oss-sec/2013/q4/473",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://seclists.org/oss-sec/2013/q4/487",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89626",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}