CVE-2013-2651 (GCVE-0-2013-2651)

Vulnerability from cvelistv5 – Published: 2013-10-23 15:00 – Updated: 2024-08-06 15:44
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in BoltWire 3.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) "p" or (2) content parameter to index.php.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:44:33.230Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20131009 [ISecAuditors Security Advisories] Multiple Reflected XSS vulnerabilities in BoltWire \u003c= v3.5",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2013-10/0033.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/123558"
          },
          {
            "name": "boltwire-cve20132651-xss(87809)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87809"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-10-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in BoltWire 3.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) \"p\" or (2) content parameter to index.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20131009 [ISecAuditors Security Advisories] Multiple Reflected XSS vulnerabilities in BoltWire \u003c= v3.5",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2013-10/0033.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/123558"
        },
        {
          "name": "boltwire-cve20132651-xss(87809)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87809"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-2651",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in BoltWire 3.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) \"p\" or (2) content parameter to index.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20131009 [ISecAuditors Security Advisories] Multiple Reflected XSS vulnerabilities in BoltWire \u003c= v3.5",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2013-10/0033.html"
            },
            {
              "name": "http://packetstormsecurity.com/files/123558",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/123558"
            },
            {
              "name": "boltwire-cve20132651-xss(87809)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87809"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-2651",
    "datePublished": "2013-10-23T15:00:00",
    "dateReserved": "2013-03-22T00:00:00",
    "dateUpdated": "2024-08-06T15:44:33.230Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.5\", \"matchCriteriaId\": \"47853691-2D7C-494A-B1B0-27CA96FA7835\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3024B825-17AB-4566-BDA2-6CDE2C62AFA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED82066A-FAA4-4DB7-955B-6283F8D99FB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E5B2974-D7E7-4F68-A6AA-B871D212896C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65964BE5-9F7B-4862-9A62-C949AF887623\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDFED4FE-F8D3-4742-AE63-F6FCA7517EC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBCAFFD7-57E4-4EDF-9F4C-C30ED43FA7D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"650204FB-33EE-47AE-9B13-782A32117BBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7032266F-5A09-4A27-A046-627307D515A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"127BA7BA-86B7-466B-9B0B-4A40905308D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63591791-EE0F-4373-852C-E59467CEB4B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85DBCBE2-1E40-4567-8916-9C7C69B901F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CDA1FD2-4BB2-4571-A5EB-4653B08FC8B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F3CD3CC-416C-4B92-A31C-DD62D4A1DFBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B98C081-51DF-4381-99DF-F6CD5E8EBA20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.2.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9E67AFB-8CC8-4CCA-9EA0-290BDB6BFB9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F830108A-ABA0-406C-A3B1-83A8FA4EE41E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A6D963B-3D9C-4997-88C0-4EFF20ECDB60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"407364D8-FC64-4932-A485-389C06B90DB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E45DCB90-BF0F-4278-A9BB-1586DC99D6CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDC5AF01-6F5E-4478-A84C-40A1F2D35094\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D22ECF24-E8AF-4F8F-A6AD-E06F360C7D00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"589D282B-35E3-4A86-A9CF-FE7DEC9E477B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BF6BDBB-D4D2-4670-9FA4-9B1CCF8CEA83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3874A0B-0BDA-4273-96BF-7E01FC8D009F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B14B0482-3B0D-40B4-9A0F-014D4E3384DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"778B29F8-4193-4CBB-A7FD-2F7BBBFE684B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D1E1DB3-2421-43FC-88F7-FBDD52854C30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"230634A5-C1E2-48AA-90CD-192CDD7AFC7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CD46E37-AD97-45B8-BF1F-F240EE32CD24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC30D942-75C2-4060-AEF5-790FD4561497\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0093AA5B-6EF0-4AD9-988D-C7AE9CD3829E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24A9D2A0-114F-4E5D-9442-B4AFDD6E9947\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C79F2130-B679-4F4F-AFC1-339440410EEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EA89D86-4CDD-462D-8D89-2F18DE80478F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AD34AD4-6FD8-4E6E-A76E-68B482F4CE80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6EC6B6F-7B34-4D93-A425-CD4FB332BB70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26FC1EDA-D172-40DE-87D8-CC96CB49E435\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F367210-DC30-4EA5-B663-23C3F9751152\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2E57721-19C7-4ED3-AFD6-90C3923D2509\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC937970-44E6-4F1A-B700-4BAC2888B798\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D0E472C-A8C6-4C17-A5A3-AEC9302C83CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F47E7A9-47D4-4710-A456-944756E79C8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2740B75-3CFF-4131-AB54-2C2662D627FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.4.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF22079C-21B3-4D72-AB00-C8A141498D25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E781C0E2-ECE4-4A49-A30E-08724AFC3113\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.06:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C29F3A0-2B70-4029-9722-7951AB17E16D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.07:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFA2C894-A0DC-4FA3-86D5-D8104A570792\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.08:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18A699E1-8925-42F2-B27F-F4D095824A7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.09:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5129F3D1-E452-425E-8036-0ECB4634B51A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"983E0A97-FE78-41C7-9DF6-E08B8E04F494\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10687A39-958D-4FBB-9BF2-B13038176AAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2881CADF-B446-4A26-BB9F-69C3BBC321B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F24C2E8D-D8C5-414B-98D1-CA8D68CED13A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE85A831-05DA-4CEA-9518-A33D5C5DEDCA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"971C4170-6955-436C-BF75-DC73B6C1B4AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6C2222F-1BDB-45DB-A6CA-F4A58E279B20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAFA20E7-6E33-43D9-93B2-6AA9747D966A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:boltwire:boltwire:3.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57DCD391-9E36-4093-8C86-1CEDA108F0F5\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple cross-site scripting (XSS) vulnerabilities in BoltWire 3.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) \\\"p\\\" or (2) content parameter to index.php.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades de XSS en BoltWire 3.5 y anteriores versiones permite a atacantes remotos inyectar script web arbitrario o HTML a trav\\u00e9s de (1) \\\"p\\\" o (2) parametro de contenido a index.php.\"}]",
      "id": "CVE-2013-2651",
      "lastModified": "2024-11-21T01:52:07.007",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2013-10-23T16:54:28.720",
      "references": "[{\"url\": \"http://archives.neohapsis.com/archives/bugtraq/2013-10/0033.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://packetstormsecurity.com/files/123558\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/87809\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://archives.neohapsis.com/archives/bugtraq/2013-10/0033.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://packetstormsecurity.com/files/123558\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/87809\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-2651\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2013-10-23T16:54:28.720\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple cross-site scripting (XSS) vulnerabilities in BoltWire 3.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) \\\"p\\\" or (2) content parameter to index.php.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades de XSS en BoltWire 3.5 y anteriores versiones permite a atacantes remotos inyectar script web arbitrario o HTML a trav\u00e9s de (1) \\\"p\\\" o (2) parametro de contenido a index.php.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.5\",\"matchCriteriaId\":\"47853691-2D7C-494A-B1B0-27CA96FA7835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3024B825-17AB-4566-BDA2-6CDE2C62AFA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED82066A-FAA4-4DB7-955B-6283F8D99FB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E5B2974-D7E7-4F68-A6AA-B871D212896C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65964BE5-9F7B-4862-9A62-C949AF887623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDFED4FE-F8D3-4742-AE63-F6FCA7517EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBCAFFD7-57E4-4EDF-9F4C-C30ED43FA7D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"650204FB-33EE-47AE-9B13-782A32117BBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7032266F-5A09-4A27-A046-627307D515A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"127BA7BA-86B7-466B-9B0B-4A40905308D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63591791-EE0F-4373-852C-E59467CEB4B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85DBCBE2-1E40-4567-8916-9C7C69B901F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CDA1FD2-4BB2-4571-A5EB-4653B08FC8B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F3CD3CC-416C-4B92-A31C-DD62D4A1DFBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B98C081-51DF-4381-99DF-F6CD5E8EBA20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9E67AFB-8CC8-4CCA-9EA0-290BDB6BFB9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F830108A-ABA0-406C-A3B1-83A8FA4EE41E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A6D963B-3D9C-4997-88C0-4EFF20ECDB60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"407364D8-FC64-4932-A485-389C06B90DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E45DCB90-BF0F-4278-A9BB-1586DC99D6CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDC5AF01-6F5E-4478-A84C-40A1F2D35094\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D22ECF24-E8AF-4F8F-A6AD-E06F360C7D00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"589D282B-35E3-4A86-A9CF-FE7DEC9E477B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BF6BDBB-D4D2-4670-9FA4-9B1CCF8CEA83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3874A0B-0BDA-4273-96BF-7E01FC8D009F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B14B0482-3B0D-40B4-9A0F-014D4E3384DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"778B29F8-4193-4CBB-A7FD-2F7BBBFE684B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D1E1DB3-2421-43FC-88F7-FBDD52854C30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"230634A5-C1E2-48AA-90CD-192CDD7AFC7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD46E37-AD97-45B8-BF1F-F240EE32CD24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC30D942-75C2-4060-AEF5-790FD4561497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0093AA5B-6EF0-4AD9-988D-C7AE9CD3829E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24A9D2A0-114F-4E5D-9442-B4AFDD6E9947\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C79F2130-B679-4F4F-AFC1-339440410EEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EA89D86-4CDD-462D-8D89-2F18DE80478F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD34AD4-6FD8-4E6E-A76E-68B482F4CE80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6EC6B6F-7B34-4D93-A425-CD4FB332BB70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26FC1EDA-D172-40DE-87D8-CC96CB49E435\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F367210-DC30-4EA5-B663-23C3F9751152\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2E57721-19C7-4ED3-AFD6-90C3923D2509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC937970-44E6-4F1A-B700-4BAC2888B798\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D0E472C-A8C6-4C17-A5A3-AEC9302C83CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F47E7A9-47D4-4710-A456-944756E79C8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2740B75-3CFF-4131-AB54-2C2662D627FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF22079C-21B3-4D72-AB00-C8A141498D25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E781C0E2-ECE4-4A49-A30E-08724AFC3113\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C29F3A0-2B70-4029-9722-7951AB17E16D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFA2C894-A0DC-4FA3-86D5-D8104A570792\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18A699E1-8925-42F2-B27F-F4D095824A7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5129F3D1-E452-425E-8036-0ECB4634B51A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"983E0A97-FE78-41C7-9DF6-E08B8E04F494\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10687A39-958D-4FBB-9BF2-B13038176AAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2881CADF-B446-4A26-BB9F-69C3BBC321B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F24C2E8D-D8C5-414B-98D1-CA8D68CED13A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE85A831-05DA-4CEA-9518-A33D5C5DEDCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"971C4170-6955-436C-BF75-DC73B6C1B4AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6C2222F-1BDB-45DB-A6CA-F4A58E279B20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAFA20E7-6E33-43D9-93B2-6AA9747D966A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boltwire:boltwire:3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57DCD391-9E36-4093-8C86-1CEDA108F0F5\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2013-10/0033.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://packetstormsecurity.com/files/123558\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/87809\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2013-10/0033.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://packetstormsecurity.com/files/123558\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/87809\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…