CNVD-2016-02074

Vulnerability from cnvd - Published: 2016-04-08
VLAI Severity ?
Title
Menubook plugin跨站脚本漏洞
Description
Menubook plugin for baserCMS是baserCMS 的一个菜单列表插件。 Menubook plugin for baserCMS 0.9.3之前的版本存在跨站脚本漏洞,允许远程攻击者通过未指定向量注入任意web脚本或 HTML。
Severity
Patch Name
Menubook plugin跨站脚本漏洞的补丁
Patch Description
Menubook plugin for baserCMS是baserCMS 的一个菜单列表插件。 Menubook plugin for baserCMS 0.9.3之前的版本存在跨站脚本漏洞,允许远程攻击者通过未指定向量注入任意web脚本或 HTML。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可联系供应商获得补丁信息: http://basercms.net

Reference
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000042 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1173
Impacted products
Name
BaserCMS Menubook plugin <0.9.3
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2016-1173"
    }
  },
  "description": "Menubook plugin  for baserCMS\u662fbaserCMS \u7684\u4e00\u4e2a\u83dc\u5355\u5217\u8868\u63d2\u4ef6\u3002\r\n\r\nMenubook plugin  for baserCMS 0.9.3\u4e4b\u524d\u7684\u7248\u672c\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e,\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7\u672a\u6307\u5b9a\u5411\u91cf\u6ce8\u5165\u4efb\u610fweb\u811a\u672c\u6216 HTML\u3002",
  "discovererName": "Takaesu Isao of Mitsui Bussan Secure Directions, Inc",
  "formalWay": "\u7528\u6237\u53ef\u8054\u7cfb\u4f9b\u5e94\u5546\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttp://basercms.net",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2016-02074",
  "openTime": "2016-04-08",
  "patchDescription": "Menubook plugin  for baserCMS\u662fbaserCMS \u7684\u4e00\u4e2a\u83dc\u5355\u5217\u8868\u63d2\u4ef6\u3002\r\n\r\nMenubook plugin  for baserCMS 0.9.3\u4e4b\u524d\u7684\u7248\u672c\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e,\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7\u672a\u6307\u5b9a\u5411\u91cf\u6ce8\u5165\u4efb\u610fweb\u811a\u672c\u6216 HTML\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Menubook plugin\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "BaserCMS Menubook plugin \u003c0.9.3"
  },
  "referenceLink": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000042\r\nhttps://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1173",
  "serverity": "\u4e2d",
  "submitTime": "2016-04-07",
  "title": "Menubook plugin\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…