mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
142 lines
4.4 KiB
JSON
142 lines
4.4 KiB
JSON
{
|
|
"id": "CVE-2014-3123",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2014-05-08T14:29:15.377",
|
|
"lastModified": "2024-11-21T02:07:29.730",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in admin/manage-images.php in the NextCellent Gallery plugin before 1.19.18 for WordPress allows remote authenticated users with the NextGEN Upload images, NextGEN Manage gallery, or NextGEN Manage others gallery permission to inject arbitrary web script or HTML via the \"Alt & Title Text\" field."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de XSS en admin/manage-images.php en el plugin NextCellent Gallery anterior a 1.19.18 para WordPress permite a usuarios remotos autenticados con el permiso NextGEN Upload Images, NextGEN Manage Gallery o NextGEN Manage Others Gallery inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del campo 'Alt & Title Text'."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N",
|
|
"baseScore": 2.1,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wpgetready:nextcellent_gallery:*:*:*:*:*:wordpress:*:*",
|
|
"versionEndIncluding": "1.9.17",
|
|
"matchCriteriaId": "BA6019AA-5E3C-4809-9D6E-88B8358A55B7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wpgetready:nextcellent_gallery:1.9.14:*:*:*:*:wordpress:*:*",
|
|
"matchCriteriaId": "C59BF942-D58E-463B-AE5A-3354CC0994C4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wpgetready:nextcellent_gallery:1.9.15:*:*:*:*:wordpress:*:*",
|
|
"matchCriteriaId": "FA70CB30-7A84-42CA-8C32-7D752BB9996F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wpgetready:nextcellent_gallery:1.9.16:*:*:*:*:wordpress:*:*",
|
|
"matchCriteriaId": "1124A4F0-8C4C-4F34-8BBE-256FC088A92B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://secunia.com/advisories/58031",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/67085",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vapid.dhs.org/advisories/wordpress/plugins/nextCellent-gallery-1.9.13",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://wordpress.org/plugins/nextcellent-gallery-nextgen-legacy/changelog",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/58031",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/67085",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.vapid.dhs.org/advisories/wordpress/plugins/nextCellent-gallery-1.9.13",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://wordpress.org/plugins/nextcellent-gallery-nextgen-legacy/changelog",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
}
|
|
]
|
|
} |