2024-12-08 03:06:42 +00:00

199 lines
5.5 KiB
JSON

{
"id": "CVE-2015-1603",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-02-19T15:59:17.563",
"lastModified": "2024-11-21T02:25:45.523",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Adminsystems CMS before 4.0.2 allow remote attackers to inject arbitrary web script or HTML via the (1) page parameter to index.php or (2) id parameter in a users_users action to asys/site/system.php."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de XSS en Adminsystems CMS anterior a 4.0.2 permiten a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTML a trav\u00e9s (1) del par\u00e1metro page en index.php o (2) del par\u00e1metro id en una acci\u00f3n users_users en asys/site/system.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adminsystems_cms_project:adminsystems_cms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.0.0",
"matchCriteriaId": "D5257182-FB6E-4718-A6A2-860D780BC5B3"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/130394/Landsknecht-Adminsystems-CMS-4.0.1-CSRF-XSS-File-Upload.html",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2015/Feb/50",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-14.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://sroesemann.blogspot.de/2015/02/report-for-advisory-sroeadv-2015-14.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2015/02/13/11",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2015/02/14/1",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2015/02/14/5",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/72605",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/kneecht/adminsystems/issues/1",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/kneecht/adminsystems/releases/tag/4.0.2",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://packetstormsecurity.com/files/130394/Landsknecht-Adminsystems-CMS-4.0.1-CSRF-XSS-File-Upload.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://seclists.org/fulldisclosure/2015/Feb/50",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-14.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://sroesemann.blogspot.de/2015/02/report-for-advisory-sroeadv-2015-14.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2015/02/13/11",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2015/02/14/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2015/02/14/5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/72605",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/kneecht/adminsystems/issues/1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/kneecht/adminsystems/releases/tag/4.0.2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}