mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
152 lines
5.4 KiB
JSON
152 lines
5.4 KiB
JSON
{
|
|
"id": "CVE-2008-2025",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-04-09T15:08:35.483",
|
|
"lastModified": "2009-04-18T05:35:44.360",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in Apache Struts before 1.2.9-162.31.1 on SUSE Linux Enterprise (SLE) 11, before 1.2.9-108.2 on SUSE openSUSE 10.3, before 1.2.9-198.2 on SUSE openSUSE 11.0, and before 1.2.9-162.163.2 on SUSE openSUSE 11.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to \"insufficient quoting of parameters.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidades de secuencias de comandos en sitios cruzados (XSS)en Apache Struts anteriores a v1.2.9-162.31.1 en SUSE Linux Enterprise (SLE) v11, anteriores a v1.2.9-108.2 en SUSE openSUSE v10.3, anteriores a v1.2.9-198.2 en SUSE openSUSE v11.0, y anteriores a v1.2.9-162.163.2 en SUSE openSUSE v11.1 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no espec\u00edficos, relativo a \"Citando la insuficiencia de par\u00e1metros.\" \r\n"
|
|
}
|
|
],
|
|
"vendorComments": [
|
|
{
|
|
"organization": "Red Hat",
|
|
"comment": "This is not a security flaw in Struts. Struts has never guaranteed to perform filtering of the untrusted user inputs used as html tag attributes names or values. If user inputs need to be used as part of the tag attributes, the JSP page needs to perform filtering explicitly. For further details, see: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-2025",
|
|
"lastModified": "2009-10-20T00:00:00"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:struts:1.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EE1B8A83-43A4-4C4F-BB95-4D9CAD882D1C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:struts:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A55DDFE1-A8AB-47BB-903E-957FCF3D023D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:struts:1.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDDD509E-9EBF-483F-9546-A1A3A1A3380E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:struts:1.2.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FC81E1A-2779-4FAF-866C-970752CD1828"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:struts:1.2.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CBD69FAE-C1A3-4213-824A-7DCCE357EB01"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:o:novell:suse_linux:11:-:enterprise:*:*:*:*:*",
|
|
"matchCriteriaId": "BB545D91-1C4C-4692-B01A-B8DAE4A958BE"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://download.opensuse.org/update/10.3-test/repodata/patch-struts-5872.xml",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://support.novell.com/security/cve/CVE-2008-2025.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://bugzilla.novell.com/show_bug.cgi?id=385273",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://launchpad.net/bugs/cve/2008-2025",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |