mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
210 lines
7.1 KiB
JSON
210 lines
7.1 KiB
JSON
{
|
|
"id": "CVE-2009-3299",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-11-03T16:30:12.530",
|
|
"lastModified": "2009-11-16T05:00:00.000",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the resume blocktype in Mahara before 1.0.13, and 1.1.x before 1.1.7, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados en el resume blocktype en Mahara anterior a v1.0.13, y v1.1.x anterior a v1.1.7, permite a atacantes remotos inyectar secuencias de comandos web y HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.0.12",
|
|
"matchCriteriaId": "075F7F07-0600-4536-ACDC-B7E3CDA68842"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E32430EE-5F2B-4936-A297-2DF55CC22937"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E26420D4-20D8-4D6D-88B5-C74F39B88720"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.0.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8FA6F03B-F449-424E-A856-5BE5FB98814F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7EFDC009-9CEB-450C-8704-CA73B147F220"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "831676A2-1A33-4605-A5F4-97FAC8A1BB18"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.0:alpha1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "84652E40-1C88-438D-BCA1-4FF4C069F9AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.0:alpha2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08F53776-5F58-4C20-8FE7-9DF06F1704A7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.0:alpha3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D5D55D2C-E6E5-44A4-831A-3EAE5C1568CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.0:beta1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "79228F92-00A8-4B74-A914-11BDF9641F6C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.0:beta2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9EEB3BF7-C4D3-4BB8-893F-B0FE252F0405"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.0:beta3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3BE91ED4-EA2A-4402-813C-1A2E5B10EA40"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.0:beta4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F7FB1F02-A03F-45E5-8D26-C007C10EE97D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A09C63AC-15A8-4722-B18E-98A86EC8A856"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "62452677-EE4C-4E5E-9DD2-D11C4211DA54"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FDC6F32-24C0-4B5E-8338-FF85B0BBF801"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "92848F08-EBFC-4579-A088-EC15D0B3EE48"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D97D8A87-390E-45AC-B1B0-CFD63C7F07E3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "894C07CE-BDF4-4652-9591-6DB6877582F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D4D278FD-9892-4B8F-BB0C-9E2323F7B9DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mahara:mahara:1.1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3F6537E2-0A45-4CFB-82A4-5BF25E59C8DF"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://eduforge.org/frs/shownotes.php?release_id=546",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://eduforge.org/frs/shownotes.php?release_id=547",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://mahara.org/interaction/forum/topic.php?id=1170",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2009/dsa-1924",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/36892",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2009/3101",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |