mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-12-16 09:42:22 +00:00
183 lines
6.3 KiB
JSON
183 lines
6.3 KiB
JSON
{
|
|
"id": "CVE-2016-1498",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2016-01-08T21:59:06.937",
|
|
"lastModified": "2024-11-21T02:46:33.700",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the OCS discovery provider component in ownCloud Server before 7.0.12, 8.0.x before 8.0.10, 8.1.x before 8.1.5, and 8.2.x before 8.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving a URL."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades de XSS en el componente OCS discovery provider en ownCloud Server en versiones anteriores a 7.0.12, 8.0.x en versiones anteriores 8.0.10, 8.1.x en versiones anteriores a 8.1.5 y 8.2.x en versiones anteriores a 8.2.2 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados involucrando una URL."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"baseScore": 6.1,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 2.7
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"baseScore": 4.3,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "7.0.11",
|
|
"matchCriteriaId": "9ED68463-3D2F-4227-8202-BE10AE025374"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:owncloud:owncloud:8.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B8C45645-3A99-4E08-952A-EEBFE35AC70E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:owncloud:owncloud:8.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6AFD0FA9-F12F-46A2-90F4-B48310A7ED0D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:owncloud:owncloud:8.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5C18316B-E0DF-4693-AD3A-8C923965931B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:owncloud:owncloud:8.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "66A3C5DA-52BA-4B86-A7A1-BEAE730E80E7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:owncloud:owncloud:8.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "453D8D0E-B385-4A8F-9D01-CDE38E6C1D4B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:owncloud:owncloud:8.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DCE3AB7D-04F1-4F0B-BFFE-4260C8E13A36"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:owncloud:owncloud:8.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "259D042F-CB8A-434C-9923-E50E92F3129F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:owncloud:owncloud:8.0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D2784965-324F-4455-97DC-7183DE7A4293"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:owncloud:owncloud:8.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "644C5331-A967-497D-A7ED-919F5988C8E8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:owncloud:owncloud:8.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBB456E3-CFF6-4378-9341-74B244DD042E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:owncloud:owncloud:8.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C2439520-80AD-45E9-8551-2C0C7A2C6F3E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:owncloud:owncloud:8.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC29D1D1-03EC-48B0-B917-F4E2C6FD3906"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:owncloud:owncloud:8.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "49E9C5BC-A6BA-4919-9934-BFAA915CC042"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:owncloud:owncloud:8.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "34AF5397-3B98-431B-B235-424A3B6BEFAC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://owncloud.org/security/advisory/?id=oc-sa-2016-001",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://owncloud.org/security/advisory/?id=oc-sa-2016-001",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |