FKIE_CVE-2013-0234

Vulnerability from fkie_nvd - Published: 2014-02-02 20:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Twitter widget in Elgg before 1.7.17 and 1.8.x before 1.8.13 allows remote attackers to inject arbitrary web script or HTML via the params[twitter_username] parameter to action/widgets/save.
References
secalert@redhat.comhttp://blog.elgg.org/pg/blog/cash/read/223/elgg-1813-and-1717
secalert@redhat.comhttp://packetstormsecurity.com/files/119903/Elgg-Twitter-Widget-Cross-Site-Scripting.html
secalert@redhat.comhttp://seclists.org/fulldisclosure/2013/Jan/251
secalert@redhat.comhttp://secunia.com/advisories/52007Vendor Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2013/01/29/4
secalert@redhat.comhttp://www.securityfocus.com/bid/57569
secalert@redhat.comhttps://github.com/Elgg/Elgg/commit/19dc507c2fccb378be2a44a762edf6c1e7afa334#L0R11Exploit, Patch
secalert@redhat.comhttps://github.com/Elgg/Elgg/commit/a74a88501c41e89c8bcd7fc650ae2f8cc0a5003d#L2L21
af854a3a-2127-422b-91ae-364da2661108http://blog.elgg.org/pg/blog/cash/read/223/elgg-1813-and-1717
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/119903/Elgg-Twitter-Widget-Cross-Site-Scripting.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2013/Jan/251
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/52007Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2013/01/29/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/57569
af854a3a-2127-422b-91ae-364da2661108https://github.com/Elgg/Elgg/commit/19dc507c2fccb378be2a44a762edf6c1e7afa334#L0R11Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/Elgg/Elgg/commit/a74a88501c41e89c8bcd7fc650ae2f8cc0a5003d#L2L21
Impacted products
Vendor Product Version
elgg elgg 1.8.0.1
elgg elgg 1.8.1
elgg elgg 1.8.3
elgg elgg 1.8.4
elgg elgg 1.8.5
elgg elgg 1.8.6
elgg elgg 1.8.7
elgg elgg 1.8.8
elgg elgg 1.8.9
elgg elgg 1.8.10
elgg elgg 1.8.11
elgg elgg 1.8.12
elgg elgg *
elgg elgg 1.7.0
elgg elgg 1.7.1
elgg elgg 1.7.2
elgg elgg 1.7.3
elgg elgg 1.7.4
elgg elgg 1.7.5
elgg elgg 1.7.6
elgg elgg 1.7.7
elgg elgg 1.7.8
elgg elgg 1.7.9
elgg elgg 1.7.10
elgg elgg 1.7.11
elgg elgg 1.7.12
elgg elgg 1.7.13
elgg elgg 1.7.14
elgg elgg 1.7.15
elgg elgg 1.7.18

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6869E5FD-652D-4927-A21B-F530996DFD91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E19B1613-CF87-4219-82CD-DA84FEB68F4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C39479E6-2E23-403E-B2CE-FA169C821EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "700764BA-53D8-4A6E-80EF-44078DAC2E18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0A30CD-8C5F-4D85-B33A-03F9F892295F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F670FE1-72D3-4A43-9904-92C3733E8CF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5126341-4736-4AC3-B2ED-4D2125BE86CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAAAF911-37AA-46CB-BB88-64E7F5F13BAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "074D8D36-98F1-4F44-AA0C-B314F0F3C134",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA40AE9-CC39-4909-82A4-96C1F0498113",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BA0909F-5A67-4E9A-A0D9-10B6080750CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "499100B2-DBF7-49A3-BD96-9F45BCAEE8B7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCA01032-958F-4B24-BC92-88D938575660",
              "versionEndIncluding": "1.7.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C80BB5F-1E77-4202-A4D3-3D96FA0969ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D07839A-E8E3-4C7C-9A05-C359FF9A2819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E34DCD3E-7A8D-4A97-838A-D5A0159068EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "663F1815-EAF8-40A3-BAC8-29E359245972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BFE9E2-F931-4197-97CA-5D58FBB763B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "779523EE-7B82-4E10-ABC5-A64D9C0EDBE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7816C52C-5360-4987-8975-9C9C9EFCACBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7AB456D-F688-4E0C-920E-E70C3351A463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDD08B0-FA37-4E81-BD79-8107F8EA5EBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0658B074-66D8-410C-AB08-BC6C7A79B2FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D49A2-A15A-41A8-A3C3-801F608E7345",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D7D1917-81AB-46C4-9176-6961A0FBCA6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3EC5E77-D90E-451F-BB00-20DBEBDD6FAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6383A2DA-20C8-484B-854A-D4A885D1E50A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7509A5-1413-4BAD-93C7-92EE464BCFA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "1729E9B0-AE66-49FA-A74F-8C0622DE0962",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9BCD0C-C890-470A-B185-97301A58712F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Twitter widget in Elgg before 1.7.17 and 1.8.x before 1.8.13 allows remote attackers to inject arbitrary web script or HTML via the params[twitter_username] parameter to action/widgets/save."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad XSS en el widget de Twitter en Elgg anterior a 1.7.17 y 1.8.x anterior a 1.8.13 permite a atacantes remotos inyectar script Web o HTML arbitrario a trav\u00e9s del par\u00e1metro params[twitter_username] hacia action/widget/save."
    }
  ],
  "id": "CVE-2013-0234",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-02-02T20:55:14.133",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://blog.elgg.org/pg/blog/cash/read/223/elgg-1813-and-1717"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://packetstormsecurity.com/files/119903/Elgg-Twitter-Widget-Cross-Site-Scripting.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/fulldisclosure/2013/Jan/251"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/52007"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2013/01/29/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/57569"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/Elgg/Elgg/commit/19dc507c2fccb378be2a44a762edf6c1e7afa334#L0R11"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://github.com/Elgg/Elgg/commit/a74a88501c41e89c8bcd7fc650ae2f8cc0a5003d#L2L21"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://blog.elgg.org/pg/blog/cash/read/223/elgg-1813-and-1717"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.com/files/119903/Elgg-Twitter-Widget-Cross-Site-Scripting.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2013/Jan/251"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/52007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/01/29/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/57569"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/Elgg/Elgg/commit/19dc507c2fccb378be2a44a762edf6c1e7afa334#L0R11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/Elgg/Elgg/commit/a74a88501c41e89c8bcd7fc650ae2f8cc0a5003d#L2L21"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…