mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
249 lines
8.7 KiB
JSON
249 lines
8.7 KiB
JSON
{
|
|
"id": "CVE-2009-4525",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-12-31T19:30:00.530",
|
|
"lastModified": "2017-08-17T01:31:36.947",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.9 and 6.x before 6.x-1.9, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via crafted data in a list of links."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo Print (tambi\u00e9n conocido como Printer, para versiones de correo electr\u00f3nico y PDF) v5.x anterior a v5.x-4.9 y v6.x anterior a v6.x-1.9, un m\u00f3dulo para Drupal, permite a atacantes remotos inyectar secuencias de comandos Web o HTML a trav\u00e9s de un dato manipulado en una lista de enlaces."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "929EF949-E619-4663-8E5A-32DC1FB759F7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E46041FE-A508-42CE-A944-08A2590DFEB8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "026E16DA-B5ED-4295-8A90-91C4039BB4E9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "570C4DBC-86CE-42AF-81D6-9D8A4C0E9233"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "871017DE-E12E-495D-A208-07EE6CCDF4A8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F9EAB0F-606A-4D87-A704-56A7A54CAA9B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DBBC7558-7A67-41C0-BDDC-ED32645F387B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "605EC83A-E689-4D45-AB0E-1B8B3A7D9CF0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16BC9CFA-00FF-4FA2-9D34-0975260E28E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.x:dev:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08171429-10CC-44C3-A9BB-1E3A2CF6FF87"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86C1B4CE-7783-4A6F-9FED-82B3A70DA5B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B841C77C-FEF8-4253-9887-9CE4942431DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "15C9FE51-FD7F-472F-8C44-EA20578244CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D11FD1BF-ABD6-4D38-96C8-2E32CBD9473D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5F787E18-3790-4F33-928F-59E2398FB76D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A156B352-D91A-4408-8240-88EAACA55B9A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8BC82E86-F2AB-4FF8-98C5-1A35D467C358"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc9:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EC8E8F4D-D9FF-4A9D-9861-E1C5A9C6DBCC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "938C1B6D-7449-49C9-853F-2AD939E784B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "15BA3E26-5B28-4DFD-8B6B-24119139B274"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD23BBD1-7550-4D9B-9A88-12B2E5F20189"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E1FD0BC0-AEC5-4DD5-986A-F6B0CADD9368"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A819F021-0530-4AE3-802F-E73C6669D607"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C8453CB-2E8E-4108-81C2-A7B2B61C44AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "99B1C895-6087-4D83-9347-760CCEB1E41F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.x:dev:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EAB1161E-7EA1-4D1B-BFC0-042F813E1148"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://drupal.org/node/604804",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://drupal.org/node/604806",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://drupal.org/node/604808",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/36707",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2009/2922",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53789",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |