CVE-2023-38219 (GCVE-0-2023-38219)

Vulnerability from cvelistv5 – Published: 2023-10-13 06:15 – Updated: 2025-02-27 20:40
VLAI?
Summary
Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. Payload is stored in an admin area, resulting in high confidentiality and integrity impact.
CWE
  • CWE-79 - Cross-site Scripting (Stored XSS) (CWE-79)
Assigner
References
Impacted products
Vendor Product Version
Adobe Adobe Commerce Affected: 0 , ≤ 2.4.7-beta1 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T17:30:14.327Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://helpx.adobe.com/security/products/magento/apsb23-50.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-38219",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-26T21:49:34.055736Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-27T20:40:52.021Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "Adobe Commerce",
          "vendor": "Adobe",
          "versions": [
            {
              "lessThanOrEqual": "2.4.7-beta1",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2023-10-10T17:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. Payload is stored in an admin area, resulting in high confidentiality and integrity impact."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "availabilityRequirement": "NOT_DEFINED",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "confidentialityRequirement": "NOT_DEFINED",
            "environmentalScore": 8.7,
            "environmentalSeverity": "HIGH",
            "exploitCodeMaturity": "NOT_DEFINED",
            "integrityImpact": "HIGH",
            "integrityRequirement": "NOT_DEFINED",
            "modifiedAttackComplexity": "LOW",
            "modifiedAttackVector": "NETWORK",
            "modifiedAvailabilityImpact": "NONE",
            "modifiedConfidentialityImpact": "HIGH",
            "modifiedIntegrityImpact": "HIGH",
            "modifiedPrivilegesRequired": "LOW",
            "modifiedScope": "NOT_DEFINED",
            "modifiedUserInteraction": "REQUIRED",
            "privilegesRequired": "LOW",
            "remediationLevel": "NOT_DEFINED",
            "reportConfidence": "NOT_DEFINED",
            "scope": "CHANGED",
            "temporalScore": 8.7,
            "temporalSeverity": "HIGH",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Cross-site Scripting (Stored XSS) (CWE-79)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-13T06:15:14.650Z",
        "orgId": "078d4453-3bcd-4900-85e6-15281da43538",
        "shortName": "adobe"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://helpx.adobe.com/security/products/magento/apsb23-50.html"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Validate Your Inputs | Cross-site Scripting (Stored XSS) (CWE-79) - Customer to Admin stored XSS with Gift wrapping"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
    "assignerShortName": "adobe",
    "cveId": "CVE-2023-38219",
    "datePublished": "2023-10-13T06:15:14.650Z",
    "dateReserved": "2023-07-13T16:21:52.614Z",
    "dateUpdated": "2025-02-27T20:40:52.021Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"4346BF61-743B-4BBE-AC90-9954FEE6E943\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F471E19-8AFE-4A6C-88EA-DF94428518F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"27E5B990-1E1C-46AC-815F-AF737D211C16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D1598F4-AA41-4F94-A986-E603DC42AC8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A3535F6-227F-4DD2-881F-9ADAB68373CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*\", \"matchCriteriaId\": \"428B889D-3BAF-46A2-913A-E0022217F804\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A0A7F6F-6218-4714-A7C7-79580FBA8FFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*\", \"matchCriteriaId\": \"304A7DB2-0174-42A2-A357-944634C2ADFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5954698-9CA1-4463-833C-E7DB447AC80A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"D845F99F-2958-4118-B27E-6D84602B7FB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*\", \"matchCriteriaId\": \"61266FCB-916E-4B72-A5CE-8E9D3D817996\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B4BB14A-5BBE-4FF3-B956-306D721D99E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D33D70D-84E7-46D9-A50B-857DF71B43C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6291AFE6-3F06-4796-B6B8-761D995F1F9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"33BE2A5D-A4B1-4863-A1D9-29F08CA8CCE2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1BCDF10-D4D2-4FB5-8A6A-960730C17911\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F747F9C6-BD3F-4DFC-BC91-6361F66E50D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*\", \"matchCriteriaId\": \"8249B061-BD24-4A05-A08B-8CE776C23F79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*\", \"matchCriteriaId\": \"40315EF0-0EAF-465B-BC82-57B74C23ED98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"62BF6A4C-BC58-40A2-AE21-B4F309562661\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D0E8BC4-17BD-4F42-A849-2CC439CF82D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9E12EC1-36A9-42F5-9EE6-88FAA6FD52F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2B3EF0E-31B4-4508-AC48-D89CB4460D89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0B4ABDB-1C22-4B26-BA4D-DA73ED1F50D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B503C35-8C90-4A24-8E60-722CDBBF556B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC5B997C-8DB4-4FDF-96F6-6DCF23970705\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8B1341E-A0C9-42EB-8BAE-E23D88BC3CB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*\", \"matchCriteriaId\": \"14CEAFB8-0812-4F19-8E83-93A61A23594F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*\", \"matchCriteriaId\": \"25A9AC2F-7AAC-41FF-8D93-3A5CBE24BED6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"D258D9EF-94FB-41F0-A7A5-7F66FA7A0055\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E5CF6F0-2388-4D3F-8FE1-43B8AF148564\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFEBDDF2-6443-4482-83B2-3CD272CF599F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6661093F-8D22-450F-BC6C-A8894A52E6A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*\", \"matchCriteriaId\": \"2515DA6D-2E74-4A05-BD29-FEEF3322BCB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B07F7B2-E915-4EFF-8FFC-91143CEF082E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"8605E4E6-0F7D-42C8-B35B-2349A0BEFC69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6318F97-E59A-4425-8DC7-045C78A644F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*\", \"matchCriteriaId\": \"324A573E-DBC8-42A0-8CB8-EDD8FBAB7115\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*\", \"matchCriteriaId\": \"54151A00-CFB8-4E6A-8E74-497CB67BF7E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6086841-C175-46A1-8414-71C6163A0E7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EBB0608-034B-4F07-A59B-9E6A989BA260\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*\", \"matchCriteriaId\": \"AC641EFE-3B9B-4988-A143-FE1F6FD0D689\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*\", \"matchCriteriaId\": \"5F7AA4A6-69E3-4BA4-A476-CA37F41D5482\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*\", \"matchCriteriaId\": \"A3D05570-FA72-4FCF-90E9-EC19731CD9F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*\", \"matchCriteriaId\": \"7DF079F1-1886-4974-A0F0-82DEA88F2E83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*\", \"matchCriteriaId\": \"7A41C717-4B9F-4972-ABA3-2294EEC20F3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*\", \"matchCriteriaId\": \"3FA80BBC-2DF2-46E1-84CE-8A899415114E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*\", \"matchCriteriaId\": \"510B1840-AE77-4BDD-9C09-26C64CC8FC81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*\", \"matchCriteriaId\": \"FA1EDF58-8384-48C4-A584-54D24F6F7973\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*\", \"matchCriteriaId\": \"9D2D9715-3A6B-4BE0-B1C5-8D19A683A083\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*\", \"matchCriteriaId\": \"789BD987-9DAD-4EAE-93DE-0E267D54F124\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*\", \"matchCriteriaId\": \"A3F113C0-00C5-4BC2-B42B-8AE3756252F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*\", \"matchCriteriaId\": \"02592D65-2D2C-460A-A970-8A18F9B156ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*\", \"matchCriteriaId\": \"99C620F3-40ED-4D7F-B6A1-205E948FD6F5\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\\u2019s browser when they browse to the page containing the vulnerable field. Payload is stored in an admin area, resulting in high confidentiality and integrity impact.\"}, {\"lang\": \"es\", \"value\": \"Las versiones de Adobe Commerce 2.4.7-beta1 (y anteriores), 2.4.6-p2 (y anteriores), 2.4.5-p4 (y anteriores) y 2.4.4-p5 (y anteriores) se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) Almacenada de la que un atacante con pocos privilegios podr\\u00eda abusar para inyectar scripts maliciosos en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\\u00edctima cuando navega a la p\\u00e1gina que contiene el campo vulnerable. El payload se almacena en un \\u00e1rea de administraci\\u00f3n, lo que genera un alto impacto en la confidencialidad y la integridad.\"}]",
      "id": "CVE-2023-38219",
      "lastModified": "2024-11-21T08:13:06.720",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@adobe.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N\", \"baseScore\": 8.7, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 5.8}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N\", \"baseScore\": 8.7, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 5.8}]}",
      "published": "2023-10-13T07:15:40.327",
      "references": "[{\"url\": \"https://helpx.adobe.com/security/products/magento/apsb23-50.html\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://helpx.adobe.com/security/products/magento/apsb23-50.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "psirt@adobe.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"psirt@adobe.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-38219\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2023-10-13T07:15:40.327\",\"lastModified\":\"2024-11-21T08:13:06.720\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. Payload is stored in an admin area, resulting in high confidentiality and integrity impact.\"},{\"lang\":\"es\",\"value\":\"Las versiones de Adobe Commerce 2.4.7-beta1 (y anteriores), 2.4.6-p2 (y anteriores), 2.4.5-p4 (y anteriores) y 2.4.4-p5 (y anteriores) se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) Almacenada de la que un atacante con pocos privilegios podr\u00eda abusar para inyectar scripts maliciosos en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable. El payload se almacena en un \u00e1rea de administraci\u00f3n, lo que genera un alto impacto en la confidencialidad y la integridad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":5.8},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":5.8}]},\"weaknesses\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"4346BF61-743B-4BBE-AC90-9954FEE6E943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F471E19-8AFE-4A6C-88EA-DF94428518F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E5B990-1E1C-46AC-815F-AF737D211C16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D1598F4-AA41-4F94-A986-E603DC42AC8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A3535F6-227F-4DD2-881F-9ADAB68373CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*\",\"matchCriteriaId\":\"428B889D-3BAF-46A2-913A-E0022217F804\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A0A7F6F-6218-4714-A7C7-79580FBA8FFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*\",\"matchCriteriaId\":\"304A7DB2-0174-42A2-A357-944634C2ADFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5954698-9CA1-4463-833C-E7DB447AC80A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D845F99F-2958-4118-B27E-6D84602B7FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*\",\"matchCriteriaId\":\"61266FCB-916E-4B72-A5CE-8E9D3D817996\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B4BB14A-5BBE-4FF3-B956-306D721D99E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D33D70D-84E7-46D9-A50B-857DF71B43C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6291AFE6-3F06-4796-B6B8-761D995F1F9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"33BE2A5D-A4B1-4863-A1D9-29F08CA8CCE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BCDF10-D4D2-4FB5-8A6A-960730C17911\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F747F9C6-BD3F-4DFC-BC91-6361F66E50D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*\",\"matchCriteriaId\":\"8249B061-BD24-4A05-A08B-8CE776C23F79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*\",\"matchCriteriaId\":\"40315EF0-0EAF-465B-BC82-57B74C23ED98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"62BF6A4C-BC58-40A2-AE21-B4F309562661\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D0E8BC4-17BD-4F42-A849-2CC439CF82D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9E12EC1-36A9-42F5-9EE6-88FAA6FD52F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2B3EF0E-31B4-4508-AC48-D89CB4460D89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0B4ABDB-1C22-4B26-BA4D-DA73ED1F50D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B503C35-8C90-4A24-8E60-722CDBBF556B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC5B997C-8DB4-4FDF-96F6-6DCF23970705\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8B1341E-A0C9-42EB-8BAE-E23D88BC3CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*\",\"matchCriteriaId\":\"14CEAFB8-0812-4F19-8E83-93A61A23594F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*\",\"matchCriteriaId\":\"25A9AC2F-7AAC-41FF-8D93-3A5CBE24BED6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D258D9EF-94FB-41F0-A7A5-7F66FA7A0055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E5CF6F0-2388-4D3F-8FE1-43B8AF148564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFEBDDF2-6443-4482-83B2-3CD272CF599F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6661093F-8D22-450F-BC6C-A8894A52E6A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"2515DA6D-2E74-4A05-BD29-FEEF3322BCB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B07F7B2-E915-4EFF-8FFC-91143CEF082E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8605E4E6-0F7D-42C8-B35B-2349A0BEFC69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6318F97-E59A-4425-8DC7-045C78A644F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"324A573E-DBC8-42A0-8CB8-EDD8FBAB7115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"54151A00-CFB8-4E6A-8E74-497CB67BF7E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6086841-C175-46A1-8414-71C6163A0E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBB0608-034B-4F07-A59B-9E6A989BA260\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"AC641EFE-3B9B-4988-A143-FE1F6FD0D689\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"5F7AA4A6-69E3-4BA4-A476-CA37F41D5482\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"A3D05570-FA72-4FCF-90E9-EC19731CD9F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"7DF079F1-1886-4974-A0F0-82DEA88F2E83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"7A41C717-4B9F-4972-ABA3-2294EEC20F3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"3FA80BBC-2DF2-46E1-84CE-8A899415114E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"510B1840-AE77-4BDD-9C09-26C64CC8FC81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"FA1EDF58-8384-48C4-A584-54D24F6F7973\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"9D2D9715-3A6B-4BE0-B1C5-8D19A683A083\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"789BD987-9DAD-4EAE-93DE-0E267D54F124\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"A3F113C0-00C5-4BC2-B42B-8AE3756252F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"02592D65-2D2C-460A-A970-8A18F9B156ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"99C620F3-40ED-4D7F-B6A1-205E948FD6F5\"}]}]}],\"references\":[{\"url\":\"https://helpx.adobe.com/security/products/magento/apsb23-50.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://helpx.adobe.com/security/products/magento/apsb23-50.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"affected\": [{\"defaultStatus\": \"affected\", \"product\": \"Adobe Commerce\", \"vendor\": \"Adobe\", \"versions\": [{\"lessThanOrEqual\": \"2.4.7-beta1\", \"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\"}]}], \"datePublic\": \"2023-10-10T17:00:00.000Z\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\\u2019s browser when they browse to the page containing the vulnerable field. Payload is stored in an admin area, resulting in high confidentiality and integrity impact.\"}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"NONE\", \"availabilityRequirement\": \"NOT_DEFINED\", \"baseScore\": 8.7, \"baseSeverity\": \"HIGH\", \"confidentialityImpact\": \"HIGH\", \"confidentialityRequirement\": \"NOT_DEFINED\", \"environmentalScore\": 8.7, \"environmentalSeverity\": \"HIGH\", \"exploitCodeMaturity\": \"NOT_DEFINED\", \"integrityImpact\": \"HIGH\", \"integrityRequirement\": \"NOT_DEFINED\", \"modifiedAttackComplexity\": \"LOW\", \"modifiedAttackVector\": \"NETWORK\", \"modifiedAvailabilityImpact\": \"NONE\", \"modifiedConfidentialityImpact\": \"HIGH\", \"modifiedIntegrityImpact\": \"HIGH\", \"modifiedPrivilegesRequired\": \"LOW\", \"modifiedScope\": \"NOT_DEFINED\", \"modifiedUserInteraction\": \"REQUIRED\", \"privilegesRequired\": \"LOW\", \"remediationLevel\": \"NOT_DEFINED\", \"reportConfidence\": \"NOT_DEFINED\", \"scope\": \"CHANGED\", \"temporalScore\": 8.7, \"temporalSeverity\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N\", \"version\": \"3.1\"}, \"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-79\", \"description\": \"Cross-site Scripting (Stored XSS) (CWE-79)\", \"lang\": \"en\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"orgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"shortName\": \"adobe\", \"dateUpdated\": \"2023-10-13T06:15:14.650Z\"}, \"references\": [{\"tags\": [\"vendor-advisory\"], \"url\": \"https://helpx.adobe.com/security/products/magento/apsb23-50.html\"}], \"source\": {\"discovery\": \"EXTERNAL\"}, \"title\": \"Validate Your Inputs | Cross-site Scripting (Stored XSS) (CWE-79) - Customer to Admin stored XSS with Gift wrapping\"}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T17:30:14.327Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://helpx.adobe.com/security/products/magento/apsb23-50.html\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-38219\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-26T21:49:34.055736Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-26T19:57:28.422Z\"}}]}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-38219\", \"assignerOrgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"adobe\", \"dateReserved\": \"2023-07-13T16:21:52.614Z\", \"datePublished\": \"2023-10-13T06:15:14.650Z\", \"dateUpdated\": \"2025-02-27T20:40:52.021Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…