fkie_cve-2010-4757
Vulnerability from fkie_nvd
Published
2011-03-15 17:55
Modified
2024-11-21 01:21
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in submitnews.php in e107 before 0.7.23 allows remote attackers to inject arbitrary web script or HTML via the submitnews_title parameter, a different vector than CVE-2008-6208. NOTE: some of these details are obtained from third party information. NOTE: this might be the same as CVE-2009-4083.1 or CVE-2011-0457.
Impacted products
Vendor Product Version
e107 e107 *
e107 e107 0.6_10
e107 e107 0.6_11
e107 e107 0.6_12
e107 e107 0.6_13
e107 e107 0.6_14
e107 e107 0.6_15
e107 e107 0.6_15a
e107 e107 0.7
e107 e107 0.7.0
e107 e107 0.7.1
e107 e107 0.7.2
e107 e107 0.7.3
e107 e107 0.7.4
e107 e107 0.7.5
e107 e107 0.7.6
e107 e107 0.7.7
e107 e107 0.7.8
e107 e107 0.7.9
e107 e107 0.7.10
e107 e107 0.7.11
e107 e107 0.7.12
e107 e107 0.7.13
e107 e107 0.7.14
e107 e107 0.7.15
e107 e107 0.7.16
e107 e107 0.7.17
e107 e107 0.7.18
e107 e107 0.7.19
e107 e107 0.7.20
e107 e107 0.7.21
e107 e107 0.545
e107 e107 0.547
e107 e107 0.548
e107 e107 0.549
e107 e107 0.551
e107 e107 0.552
e107 e107 0.553
e107 e107 0.554
e107 e107 0.554
e107 e107 0.555
e107 e107 0.600
e107 e107 0.601
e107 e107 0.602
e107 e107 0.603
e107 e107 0.604
e107 e107 0.605
e107 e107 0.606
e107 e107 0.607
e107 e107 0.608
e107 e107 0.609
e107 e107 0.610
e107 e107 0.611
e107 e107 0.612
e107 e107 0.613
e107 e107 0.614
e107 e107 0.615
e107 e107 0.615a
e107 e107 0.616
e107 e107 0.617
e107 e107 0.6171
e107 e107 0.6172
e107 e107 0.6173
e107 e107 0.6174
e107 e107 0.6175



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E3AB3F8-1540-4078-B618-419419A1B942",
              "versionEndIncluding": "0.7.22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6_10:*:*:*:*:*:*:*",
              "matchCriteriaId": "18C34EB0-7685-4346-81A2-371C1F19F6AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6_11:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB26A2A4-B0DE-4130-AA5F-76D5394A0614",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6_12:*:*:*:*:*:*:*",
              "matchCriteriaId": "90909932-AD39-4648-8621-5866F0C4AB12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6_13:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F208E9-3C39-4D00-B1E0-5CD0B315E740",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6_14:*:*:*:*:*:*:*",
              "matchCriteriaId": "27C7402F-54C9-4FDA-B181-85941DDC7010",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6_15:*:*:*:*:*:*:*",
              "matchCriteriaId": "061B1AF2-2BA7-49CB-9F8B-91BF5D5B0BF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6_15a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F77F5E4-8636-41F5-9A80-055CC0FC0346",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "70AB914E-D616-45D2-A451-1C247B8B6E4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA5B2762-4A7C-45EE-8A1B-0E7939978321",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA03C1AC-97EA-47ED-9558-A7CA48420AB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32695A82-B042-46B7-9CB4-20F3446E0C9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6716A040-0CBE-4402-AB2A-1621B1240B0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "81627355-AB45-4D47-8DD2-4087E6971EF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2DAAA4F-B893-4914-8538-E68DDA211225",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B649DDC6-EEE6-47E1-A69A-831E5C2DD58C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FEEC90E-8640-4786-B014-CAD83EC4F2E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E29B9B12-4C94-4A8D-B407-2D288502EFE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CAADA1-1FBB-4983-A942-FC4490CE8D8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4D7C699-0E92-4D9C-9D8F-87C39A28ACCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C62F8AD-EA30-441E-B97F-EF8DE640DC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F96C30A8-7E56-4806-B8D7-851D75B08738",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1C22711-AEC4-438F-9B37-64D36B0BDFC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E2AA435-E5FC-4555-B582-5C6FFC99327B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A81364B-FB65-4591-ACA3-9D5991F0C30C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "069F5C7C-F549-4B92-A1EA-6310CCF64334",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "46EF46A3-7197-4C00-8298-9B938B6EE97B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "B242DBD4-299A-49BC-B399-6C48E04D10DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "756D821D-63CA-4DCC-8335-679290C197BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFAB4C3E-EE6F-4603-A829-25138966CADF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "56459690-0C9E-4049-A20A-E17152913065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.545:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DDD8B3B-8580-4624-8D77-E3FD97DFF4A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.547:beta:*:*:*:*:*:*",
              "matchCriteriaId": "EF6E08F0-004C-4A00-861D-72A9082C3F41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.548:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CBF301C0-0DEF-4922-85BF-66BF6192A745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.549:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4805886F-099B-4808-A2FF-0A0B77CD566D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.551:beta:*:*:*:*:*:*",
              "matchCriteriaId": "984B6A2B-F9D5-48AB-8B57-DD62B200C441",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.552:beta:*:*:*:*:*:*",
              "matchCriteriaId": "45D6F945-96D1-42A1-AE66-3D7988DE9A15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.553:beta:*:*:*:*:*:*",
              "matchCriteriaId": "3065526A-4DDE-4F7F-97C5-2E0F3D0D106B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.554:*:*:*:*:*:*:*",
              "matchCriteriaId": "6454D949-83A2-4F69-92E1-BBCD84F21BC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.554:beta:*:*:*:*:*:*",
              "matchCriteriaId": "27ABDE74-B886-47A6-909B-7EA428260FAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.555:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DC65CB58-4F17-4F8D-9682-9D6C1B33F39D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.600:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E80F85C-61AD-49C0-9EBF-B79F728F6A97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.601:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FE097FC-A525-4599-9FDA-1A011EECE767",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.602:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FF51B0D-E020-491D-92A9-D2A01A7417AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.603:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8692341-8DF2-4943-853A-4AAF1F313914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.604:*:*:*:*:*:*:*",
              "matchCriteriaId": "75197306-53DB-4C94-959B-C46D3FB1F42B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.605:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C5C91C-C1C5-457D-9E09-24C7CACCC280",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.606:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EB88C92-4F62-471A-8C10-C13C890E764F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.607:*:*:*:*:*:*:*",
              "matchCriteriaId": "5585DC36-C65F-4FCA-B26F-E4A7901863E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.608:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7DD56C-66F7-421C-B211-07C7856112C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.609:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E14B108-228D-454F-AF16-9D9086E4C10B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.610:*:*:*:*:*:*:*",
              "matchCriteriaId": "04C91C45-9A96-4E69-8A0A-D619AB45BC08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.611:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F7C68F4-9ECD-41A9-B4AE-48F028841428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.612:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B75E28-08DE-4CA2-A60B-FB2F61AEC5BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.613:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9AA824A-CEE6-460B-A668-92FC3A822305",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.614:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A51FBB3-42CE-40E1-A15D-ADDFBF8E203D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.615:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEAC1FD5-ECD1-480C-827E-F1AE8484C4EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.615a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D17F613A-6BE1-4B45-8E40-8E44E0EEA756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.616:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CB33E9-9AB8-482A-A196-768A2085A49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.617:*:*:*:*:*:*:*",
              "matchCriteriaId": "12BD5CAD-0EB8-48F2-AF80-510584A83446",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6171:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD8CD2A8-C8E8-4A5F-8355-6DF45C9DF45C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6172:*:*:*:*:*:*:*",
              "matchCriteriaId": "92E294FE-F0A2-45FC-BB67-D988DD89D2AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6173:*:*:*:*:*:*:*",
              "matchCriteriaId": "9640315B-7F04-4F5A-B213-8FAF509DFF01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6174:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA89549A-6CD7-4DDB-A8C8-ADF103F6CDFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6175:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF75A192-81C1-4F58-A660-7EFE4F33E58B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in submitnews.php in e107 before 0.7.23 allows remote attackers to inject arbitrary web script or HTML via the submitnews_title parameter, a different vector than CVE-2008-6208.  NOTE: some of these details are obtained from third party information.  NOTE: this might be the same as CVE-2009-4083.1 or CVE-2011-0457."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en submitnews.php de e107 en versiones anteriores a la 0.7.23 permite a atacantes remotos inyectar codigo de script web o c\u00f3digo HTML de su elecci\u00f3n a trav\u00e9s del par\u00e1metro submitnews_title. Un vector diferente al del CVE-2008-6208.  NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceras partes.  NOTA: puede ser el mismo al del CVE-2009-4083.1 o CVE-2011-0457."
    }
  ],
  "id": "CVE-2010-4757",
  "lastModified": "2024-11-21T01:21:41.563",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-03-15T17:55:01.907",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://e107.org/comment.php?comment.news.872"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://e107.org/svn_changelog.php?version=0.7.23"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/newspost.php?r1=11655\u0026r2=11654\u0026pathrev=11655"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1024351"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.madirish.net/?article=471"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61331"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://e107.org/comment.php?comment.news.872"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://e107.org/svn_changelog.php?version=0.7.23"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/newspost.php?r1=11655\u0026r2=11654\u0026pathrev=11655"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1024351"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.madirish.net/?article=471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61331"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.