René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

217 lines
7.9 KiB
JSON

{
"id": "CVE-2009-2351",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-07-07T23:30:00.250",
"lastModified": "2018-10-30T16:26:33.437",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Opera 9.52 and earlier does not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header, a related issue to CVE-2009-1312. NOTE: it was later reported that 10.00 Beta 3 Build 1699 is also affected."
},
{
"lang": "es",
"value": "El navegador Opera versi\u00f3n 9.52 y versiones anteriores no bloquean javascript: URI en los encabezados de actualizaci\u00f3n en las respuestas HTTP, lo que permite a los atacantes remotos conducir ataques de tipo Cross-Site Scripting (XSS) mediante vectores relacionados con (1) inyectar un encabezado Refresh o (2) especificar el contenido de un encabezado Refresh, un problema relacionado con CVE-2009-1312. NOTA: luego se inform\u00f3 que 10.00 Beta 3 Build 1699 tambi\u00e9n se ve afectado."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.52",
"matchCriteriaId": "BC7CF5F1-7CB8-4E77-8462-CE1BF0591D58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEE4473-88C0-4E28-A5B5-F7383B0E5558"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"matchCriteriaId": "623E4466-82CC-4BDD-BE25-3BB33B585547"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta_3:*:*:*:*:*:*",
"matchCriteriaId": "ABB6D630-28EC-4506-AD0D-8C9A5E7D45CB"
}
]
}
]
}
],
"references": [
{
"url": "http://websecurity.com.ua/3275/",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://websecurity.com.ua/3386/",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/504718/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/504723/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/35571",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}