FKIE_CVE-2018-15614

Vulnerability from fkie_nvd - Published: 2019-01-23 17:29 - Updated: 2024-11-21 03:51
Summary
A vulnerability in the one-x Portal component of IP Office could allow an authenticated user to perform stored cross site scripting attacks via fields in the Conference Scheduler Service that could affect other application users. Affected versions of IP Office include 10.0 through 10.1 SP3 and 11.0 versions prior to 11.0 SP1.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:avaya:ip_office:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "96AC8E27-36AF-4063-9816-9B32FA8495AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "B86F3D17-7408-4721-9921-3EB702018C6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D7B64-7AD6-47D0-846D-A70C2838B653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "0EF71DB4-1523-4270-B0D8-0D20A2A6EAE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "2E32E623-597A-4931-B7CF-EED6EEBA61DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "47898FEC-4BB7-469F-9020-2D9FB1B2C50E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "D429B865-B22A-4F9B-922F-D1F817DF1147",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "AE40493E-ED60-4BFC-9E48-D3148E4D0834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:ip_office:10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D9AA27-CBFC-4547-A1D0-777D9C11EE13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:ip_office:10.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "40E9E848-9578-41C5-AD68-1F1EF954CCCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:ip_office:10.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "D4712EC5-6085-46C3-949C-12E815099D52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:ip_office:10.1:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "93DECE98-A44C-4161-A46B-6926CC7A79A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:ip_office:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BA0E98-05EA-44CA-AAEA-0B1BA8881B2C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the one-x Portal component of IP Office could allow an authenticated user to perform stored cross site scripting attacks via fields in the Conference Scheduler Service that could affect other application users. Affected versions of IP Office include 10.0 through 10.1 SP3 and 11.0 versions prior to 11.0 SP1."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el componente one-x Portal de IP Office podr\u00eda permitir que un usuario autenticado realice ataques de Cross-Site Scripting (XSS) persistente mediante cambios en el servicio \"Conference Scheduler\" que podr\u00edan afectar a otros usuarios de la aplicaci\u00f3n. Las versiones afectadas de IP Office incluyen desde la 10.0 hasta la 10.1 SP3 y las versiones 11.0 anteriores a la 11.0 SP1."
    }
  ],
  "id": "CVE-2018-15614",
  "lastModified": "2024-11-21T03:51:10.737",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.2,
        "source": "securityalerts@avaya.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-01-23T17:29:00.397",
  "references": [
    {
      "source": "securityalerts@avaya.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://downloads.avaya.com/css/P8/documents/101054317"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://downloads.avaya.com/css/P8/documents/101054317"
    }
  ],
  "sourceIdentifier": "securityalerts@avaya.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "securityalerts@avaya.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…