René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

138 lines
4.4 KiB
JSON

{
"id": "CVE-2009-2076",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-06-16T19:30:00.250",
"lastModified": "2009-06-29T04:00:00.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Views 6.x before 6.x-2.6, a module for Drupal, allows remote authenticated users to inject arbitrary web script or HTML via (1) exposed filters in the Views UI administrative interface and in the (2) view name parameter in the define custom views feature. NOTE: vector 2 is only exploitable by users with administer views permissions."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Views v6.x anteriores a v6.x-2.6, un modulo de Drupal, permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrariamente a trav\u00e9s de (1) filtros que se muestran en la interfaz administrativa de usuario Views y el (2) par\u00e1metro \"view name\" en la caracter\u00edstica de personalizar vistas. NOTA: vector 2 es \u00fanicamente explotable por usuarios con permisos administrativos de vistas."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:views:6.x-2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AB48B703-BFDC-4BC2-AADB-1D5877BD6F79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:views:6.x-2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9D4CAFA5-CB7B-475B-9278-2C5576934FE7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:views:6.x-2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "258F8CAF-E1A5-43D8-B515-4C5A5E541CC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:views:6.x-2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E67C9A56-E67D-4517-8956-4354D62A506B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:views:6.x-2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8E28C97B-E461-4CC7-9751-EBF46B93F84F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:views:6.x-2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA2AF1A-C62A-4AEB-8704-E9671C9285E5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54"
}
]
}
]
}
],
"references": [
{
"url": "http://drupal.org/node/488068",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://drupal.org/node/488082",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://lampsecurity.org/drupal-views-xss-vulnerability",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/35304",
"source": "cve@mitre.org"
}
]
}