2024-12-15 03:03:56 +00:00

113 lines
4.1 KiB
JSON

{
"id": "CVE-2022-28820",
"sourceIdentifier": "psirt@adobe.com",
"published": "2022-04-21T19:15:09.053",
"lastModified": "2024-11-21T06:57:59.727",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ACS Commons version 5.1.x (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in /apps/acs-commons/content/page-compare.html endpoint via the a and b GET parameters. User input submitted via these parameters is not validated or sanitised. An attacker must provide a link to someone with access to AEM Author, and could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. The exploitation of this issue requires user interaction in order to be successful."
},
{
"lang": "es",
"value": "ACS Commons versi\u00f3n 5.1.x (y anteriores) sufre una vulnerabilidad de tipo Cross-site Scripting (XSS) Reflejado en el endpoint /apps/acs-commons/content/page-compare.html por medio de los par\u00e1metros GET a y b. La entrada del usuario enviada por medio de estos par\u00e1metros no es comprobada ni es saneada. Un atacante debe proporcionar un enlace a alguien con acceso a AEM Author, y podr\u00eda explotar potencialmente esta vulnerabilidad para inyectar contenido JavaScript malicioso en los campos de formulario vulnerables y ejecutarlo en el contexto del navegador de la v\u00edctima. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario para tener \u00e9xito"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.2.0",
"matchCriteriaId": "158D7FDA-1ACC-4D7D-94AD-5C38FCF3A417"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-w5m2-299g-rff5",
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-w5m2-299g-rff5",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}