René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

167 lines
5.5 KiB
JSON

{
"id": "CVE-2020-9732",
"sourceIdentifier": "psirt@adobe.com",
"published": "2020-09-10T17:15:35.423",
"lastModified": "2020-09-11T02:26:57.687",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The AEM Forms add-on for versions 6.5.5.0 (and below) and 6.4.8.2 (and below) are affected by a stored XSS vulnerability that allows users with 'Author' privileges to store malicious scripts in fields associated with the Sites component. These scripts may be executed in a victim\u2019s browser when they open the page containing the vulnerable field."
},
{
"lang": "es",
"value": "El add-on AEM Forms para versiones 6.5.5.0 (y por debajo) y 6.4.8.2 (y por debajo) est\u00e1 afectado por una vulnerabilidad de tipo XSS almacenado que permite a usuarios con privilegios de \"Author\" almacenar scripts maliciosos en campos asociados con el componente Sites. Estos scripts pueden ser ejecutados en el navegador de la v\u00edctima cuando abre la p\u00e1gina que contiene el campo vulnerable"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.2.1.20",
"matchCriteriaId": "E9F4514A-800A-40BE-B562-D243E10BE7D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.3.0.0",
"versionEndIncluding": "6.3.3.8",
"matchCriteriaId": "F61E8D62-4FB7-48E0-A750-C3F6EBE5F613"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0.0",
"versionEndIncluding": "6.4.8.1",
"matchCriteriaId": "0482E99D-21DC-489C-8E0B-707A70A48FC0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5.0.0",
"versionEndIncluding": "6.5.5.0",
"matchCriteriaId": "C9D06479-83AE-4F9A-BAE9-7849798F1A30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager_forms:6.4.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DC447B4A-8DCA-41AE-8734-467E8BF319CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager_forms:6.5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0D0AA4A6-EC3A-4322-8D8C-E7BAD9C4EB29"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb20-56.html",
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}