All the vulnerabilites related to jo_hasenau - gridelements
cve-2014-3949
Vulnerability from cvelistv5
Published
2014-06-04 14:00
Modified
2024-08-06 10:57
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the layout wizard in the Grid Elements (gridelements) extension before 1.5.1 and 2.0.x before 2.0.3 for TYPO3 allows remote authenticated backend users to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-008 | x_refsource_MISC | |
http://typo3.org/extensions/repository/view/gridelements | x_refsource_CONFIRM | |
http://secunia.com/advisories/58592 | third-party-advisory, x_refsource_SECUNIA | |
http://www.openwall.com/lists/oss-security/2014/06/03/3 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:57:18.069Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-008" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://typo3.org/extensions/repository/view/gridelements" }, { "name": "58592", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58592" }, { "name": "[oss-security] 20140603 Re: CVE ID request: typo3", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/06/03/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the layout wizard in the Grid Elements (gridelements) extension before 1.5.1 and 2.0.x before 2.0.3 for TYPO3 allows remote authenticated backend users to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-06-04T12:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-008" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://typo3.org/extensions/repository/view/gridelements" }, { "name": "58592", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58592" }, { "name": "[oss-security] 20140603 Re: CVE ID request: typo3", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/06/03/3" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-3949", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the layout wizard in the Grid Elements (gridelements) extension before 1.5.1 and 2.0.x before 2.0.3 for TYPO3 allows remote authenticated backend users to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-008", "refsource": "MISC", "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-008" }, { "name": "http://typo3.org/extensions/repository/view/gridelements", "refsource": "CONFIRM", "url": "http://typo3.org/extensions/repository/view/gridelements" }, { "name": "58592", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58592" }, { "name": "[oss-security] 20140603 Re: CVE ID request: typo3", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/06/03/3" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-3949", "datePublished": "2014-06-04T14:00:00", "dateReserved": "2014-06-03T00:00:00", "dateUpdated": "2024-08-06T10:57:18.069Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2014-06-04 14:55
Modified
2024-11-21 02:09
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the layout wizard in the Grid Elements (gridelements) extension before 1.5.1 and 2.0.x before 2.0.3 for TYPO3 allows remote authenticated backend users to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
jo_hasenau | gridelements | * | |
jo_hasenau | gridelements | 0.1.0 | |
jo_hasenau | gridelements | 0.2.0 | |
jo_hasenau | gridelements | 0.3.0 | |
jo_hasenau | gridelements | 0.5.0 | |
jo_hasenau | gridelements | 0.6.0 | |
jo_hasenau | gridelements | 1.0.0 | |
jo_hasenau | gridelements | 1.1.0 | |
jo_hasenau | gridelements | 1.2.0 | |
jo_hasenau | gridelements | 1.2.1 | |
jo_hasenau | gridelements | 1.2.2 | |
jo_hasenau | gridelements | 1.2.3 | |
jo_hasenau | gridelements | 1.3.0 | |
jo_hasenau | gridelements | 1.3.1 | |
jo_hasenau | gridelements | 1.3.2 | |
jo_hasenau | gridelements | 1.3.3 | |
jo_hasenau | gridelements | 1.3.4 | |
jo_hasenau | gridelements | 1.3.5 | |
jo_hasenau | gridelements | 1.3.6 | |
jo_hasenau | gridelements | 1.3.7 | |
jo_hasenau | gridelements | 1.3.8 | |
jo_hasenau | gridelements | 1.3.9 | |
jo_hasenau | gridelements | 1.3.10 | |
jo_hasenau | gridelements | 1.3.11 | |
jo_hasenau | gridelements | 1.3.12 | |
jo_hasenau | gridelements | 1.3.13 | |
jo_hasenau | gridelements | 1.4.0 | |
jo_hasenau | gridelements | 1.4.1 | |
typo3 | typo3 | - | |
jo_hasenau | gridelements | 2.0.0 | |
jo_hasenau | gridelements | 2.0.1 | |
jo_hasenau | gridelements | 2.0.2 | |
typo3 | typo3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:*:*:*:*:*:*:*:*", "matchCriteriaId": "93D2F82D-F866-4E01-B5CB-97F6ABA52F38", "versionEndIncluding": "1.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "09111685-4297-4F93-8052-318D4FD5E808", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "17FDD00C-90C5-4EA2-8B72-01C9C0B95459", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "13A405A9-5066-4B4B-AED6-B4734D46FDA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "86549BF1-84EE-49DA-AD84-567B5CB5F0D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:0.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AF66FBF-FEF1-4190-BAA9-A31E6D5809F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F92AB4BD-CC6B-46C8-8621-C2F8467B9442", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F07B3379-173D-4135-94B3-6A1B932E4E26", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B09F6A98-35CD-4A2A-A6B5-90B177921561", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1383A3D6-2643-4EA2-B326-438BB38C12B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C145E2A0-04BA-4BEB-A50E-4041D0D4AEF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "1B8E5264-5E3A-45D5-8E35-26EA6BDBA06E", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "19BB9EAE-C9A1-41EA-A06D-2B5FB75DB37E", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "05ABCCE1-C176-49F0-AE28-4A318B90C64B", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "07DCEDC1-1058-4281-A9C9-5B8E8170E932", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "354E43A6-9190-4C6E-A757-BAE006652834", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B5366D77-F6E3-4127-A006-C29D98B80103", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "65522EE6-A402-4CAC-B260-4E6D26D838CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "F1E45A7A-90A0-40F2-8684-C2F5A010DB81", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "77C69307-17E4-4B93-8B3C-9DB8FF4D7E20", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "595323ED-9C0A-4B3E-8ECB-F5327278FC63", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "3A392163-529B-49FA-B8D5-9037ABDED2A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "1BB3339C-1081-4822-BE24-49E84991624F", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "6BEC7DB2-FE6F-4B41-BA3F-7B482ADF22C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "E0985C30-036E-4915-BBFF-7146958C986F", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "A4C626CA-19BF-4BAF-B6BC-B5B70B01CA05", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB3E1B7D-2008-4226-A5A1-A3FBCD39D863", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6A669183-F816-4A0A-BD99-15B8E7080408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:typo3:typo3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E66C5ABA-7727-4562-A792-5E450098D520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE227017-1C49-48BC-B221-C6952D94317E", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E3EC06E3-5DC2-4E11-BF26-52024323BE32", "vulnerable": true }, { "criteria": "cpe:2.3:a:jo_hasenau:gridelements:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4D9CD0BE-74DA-4112-A47F-B41E1E0325E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:typo3:typo3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E66C5ABA-7727-4562-A792-5E450098D520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the layout wizard in the Grid Elements (gridelements) extension before 1.5.1 and 2.0.x before 2.0.3 for TYPO3 allows remote authenticated backend users to inject arbitrary web script or HTML via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de XSS en el asistente de dise\u00f1o en la extensi\u00f3n Grid Elements (gridelements) anterior a 1.5.1 y 2.0.x anterior a 2.0.3 para TYPO3 permite a usuarios remotos autenticados de backend inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2014-3949", "lastModified": "2024-11-21T02:09:12.163", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-06-04T14:55:05.467", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/58592" }, { "source": "cve@mitre.org", "url": "http://typo3.org/extensions/repository/view/gridelements" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-008" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/06/03/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/58592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://typo3.org/extensions/repository/view/gridelements" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/06/03/3" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }