mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
167 lines
5.3 KiB
JSON
167 lines
5.3 KiB
JSON
{
|
|
"id": "CVE-2013-5308",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2013-08-16T17:55:09.703",
|
|
"lastModified": "2024-11-21T01:57:16.783",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the RealURL Management (realurlmanagement) extension 0.3.4 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad Cross-site scripting (XSS) en la extensi\u00f3n RealURL Management (realurlmanagement) v0.3.4 y anteriores para TYPO3, permite a atacantes remotos inyectar web scripts arbitrarios o HTML mediante vectores desconocidos."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"baseScore": 4.3,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:juralsulek:realurlmanagement:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "0.3.4",
|
|
"matchCriteriaId": "D06B55AE-A088-42E8-AA6B-9CC02BA8C497"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:juralsulek:realurlmanagement:0.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BDD1CC74-18FB-4671-8C3C-433C1BDF76DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:juralsulek:realurlmanagement:0.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F3A1B080-6C24-4CA1-A68D-E4AE2801B235"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:juralsulek:realurlmanagement:0.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8D7CA9C5-0E42-4059-8818-409D5BB4F617"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:juralsulek:realurlmanagement:0.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2E3722D6-A9E8-47D4-858F-8F9D42E8AF04"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:juralsulek:realurlmanagement:0.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F5FC2823-7EBA-4EF0-BFA9-D2133E60504B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:juralsulek:realurlmanagement:0.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "135CC504-FBE3-4D5B-AFAA-A5E376B121B7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:juralsulek:realurlmanagement:0.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78FC382A-5E0E-4B08-BECC-8C4A9F469F32"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:juralsulek:realurlmanagement:0.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A8FAAD3E-6D27-4A32-98E9-CDA118C86256"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E66C5ABA-7727-4562-A792-5E450098D520"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://osvdb.org/95958",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-013",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/61654",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86237",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/95958",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-013",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/61654",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86237",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |