mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
87 lines
3.4 KiB
JSON
87 lines
3.4 KiB
JSON
{
|
|
"id": "CVE-2024-43738",
|
|
"sourceIdentifier": "psirt@adobe.com",
|
|
"published": "2024-12-10T22:15:10.153",
|
|
"lastModified": "2024-12-17T15:11:07.987",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Adobe Experience Manager versions 6.5.21 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could allow an attacker to execute arbitrary code in the context of the victim's browser. This issue occurs when data from a malicious source is processed by a web application and subsequently written to the web page without proper sanitization, allowing for the execution of unintended script code or the alteration of the intended user interface. User interaction is required as the victim must visit a malicious page or view a maliciously crafted link."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Las versiones 6.5.21 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de DOM-based Cross-Site Scripting (XSS) en DOM que podr\u00eda permitir a un atacante ejecutar c\u00f3digo arbitrario en el contexto del navegador de la v\u00edctima. Este problema se produce cuando una aplicaci\u00f3n web procesa datos de una fuente maliciosa y, posteriormente, los escribe en la p\u00e1gina web sin la limpieza adecuada, lo que permite la ejecuci\u00f3n de c\u00f3digo de secuencia de comandos no deseado o la alteraci\u00f3n de la interfaz de usuario prevista. La interacci\u00f3n del usuario es necesaria ya que la v\u00edctima debe visitar una p\u00e1gina maliciosa o ver un enlace creado con fines malintencionados."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "psirt@adobe.com",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"baseScore": 5.4,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.3,
|
|
"impactScore": 2.7
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "psirt@adobe.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
|
|
"versionEndExcluding": "6.5.22.0",
|
|
"matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
|
"versionEndExcluding": "2024.11.0",
|
|
"matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html",
|
|
"source": "psirt@adobe.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |