2024-12-08 03:06:42 +00:00

122 lines
4.0 KiB
JSON

{
"id": "CVE-2007-6659",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-01-04T11:46:00.000",
"lastModified": "2024-11-21T00:40:42.380",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in 2z project 0.9.6.1 allow remote attackers to inject arbitrary web script or HTML via the (1) contentshort or (2) contentfull parameter in an addnews action to the default URI; (3) the content parameter in a pm write action to 2z/admin.php; (4) the referer parameter to templates/default/usermenu.tpl, accessed through index.php; or the (5) newavatar or (6) newphoto parameter in a profile action to the default URI under 2z/."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en 2z project 0.9.6.1 permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de los par\u00e1metros (1) contentshort o (2) contentfull en una acci\u00f3n addnews del URI por defecto;(3) el par\u00e1metro content en una acci\u00f3n pm write de 2z/admin.php; (4) el par\u00e1metro referer de templates/default/usermenu.tpl, accedido a trav\u00e9s de index.php; o los par\u00e1metros (5) newavatar o (6) newphoto en una acci\u00f3n profile del URI por defecto bajo 2z/."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:2z_project:2z_project:0.9.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1E80A0B-04AB-4391-94C8-1D389BCE5606"
}
]
}
]
}
],
"references": [
{
"url": "http://2z-project.ru/forum/viewtopic.php?pid=8309",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/28244",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/3514",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/485590/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/27057",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://2z-project.ru/forum/viewtopic.php?pid=8309",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/28244",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://securityreason.com/securityalert/3514",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/485590/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/27057",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}