2024-12-08 03:06:42 +00:00

160 lines
5.2 KiB
JSON

{
"id": "CVE-2013-5326",
"sourceIdentifier": "psirt@adobe.com",
"published": "2013-11-13T01:55:09.283",
"lastModified": "2024-11-21T01:57:19.377",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Adobe ColdFusion 9.0 before Update 12, 9.0.1 before Update 11, 9.0.2 before Update 6, and 10 before Update 12, when the CFIDE directory is available, allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors related to the logviewer directory."
},
{
"lang": "es",
"value": "Una vulnerabilidad de tipo cross-site scripting (XSS) en Adobe ColdFusion versi\u00f3n 9.0 anterior a Update 12, versi\u00f3n 9.0.1 anterior a Update 11, versi\u00f3n 9.0.2 anterior a Update 6 y versi\u00f3n 10 anterior a Update 12, cuando el directorio CFIDE est\u00e1 disponible, permite a los usuarios autenticados remotamente inyectar script web o HTML arbitrario por medio de vectores no especificados relacionados con el directorio logviewer."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"baseScore": 3.5,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "113431FB-E4BE-4416-800C-6B13AD1C0E92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7FBC38B4-D957-4645-BA96-E99975271482"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:9.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CD9AAAA5-231A-43BE-AD00-0918F0C9F90C"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:*:update11:*:*:*:*:*:*",
"versionEndIncluding": "10.0",
"matchCriteriaId": "3F6F1415-B993-4792-AC9B-47DAD89155B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3FAE2BA4-7CD9-4CBD-9D77-56D591FBDB24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:10.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "1C4D259E-56B1-4D53-80A9-52D0687779C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:10.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "09F8F645-DD28-4159-877E-40B4C8CDA4CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:10.0:update3:*:*:*:*:*:*",
"matchCriteriaId": "1B83D6CF-4C45-4B7A-9AFC-9961E1FE0686"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:10.0:update4:*:*:*:*:*:*",
"matchCriteriaId": "F54FF25A-EF5B-4DE0-802C-C9B00A963C21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:10.0:update8:*:*:*:*:*:*",
"matchCriteriaId": "34472770-FFCE-4088-8658-FA0A552BEAA6"
}
]
}
]
}
],
"references": [
{
"url": "http://www.adobe.com/support/security/bulletins/apsb13-27.html",
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/295276",
"source": "psirt@adobe.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.adobe.com/support/security/bulletins/apsb13-27.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/295276",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
}
]
}