Vulnerabilites related to elgg - elgg
CVE-2011-2935 (GCVE-0-2011-2935)
Vulnerability from cvelistv5
Published
2019-11-12 13:45
Modified
2024-08-06 23:15
Severity ?
CWE
  • unspecified
Summary
Elgg through 1.7.10 has XSS
Impacted products
Vendor Product Version
Elgg Elgg Version: through 1.7.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:32.022Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "Debian",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://security-tracker.debian.org/tracker/CVE-2011-2935"
          },
          {
            "name": "Red Hat",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/cve-2011-2935"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Elgg",
          "vendor": "Elgg",
          "versions": [
            {
              "status": "affected",
              "version": "through 1.7.10"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Elgg through 1.7.10 has XSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "unspecified",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-12T13:45:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "Debian",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://security-tracker.debian.org/tracker/CVE-2011-2935"
        },
        {
          "name": "Red Hat",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/cve-2011-2935"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-2935",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Elgg",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "through 1.7.10"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Elgg"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Elgg through 1.7.10 has XSS"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "unspecified"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "Debian",
              "refsource": "DEBIAN",
              "url": "https://security-tracker.debian.org/tracker/CVE-2011-2935"
            },
            {
              "name": "Red Hat",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/security/cve/cve-2011-2935"
            },
            {
              "name": "https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities",
              "refsource": "MISC",
              "url": "https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2935",
    "datePublished": "2019-11-12T13:45:01",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:32.022Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-3733 (GCVE-0-2011-3733)
Vulnerability from cvelistv5
Published
2011-09-23 23:00
Modified
2024-09-16 21:07
Severity ?
CWE
  • n/a
Summary
Elgg 1.7.6 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by vendors/simpletest/test/visual_test.php and certain other files.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:46:02.702Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/elgg-1.7.6"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Elgg 1.7.6 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by vendors/simpletest/test/visual_test.php and certain other files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-09-23T23:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/elgg-1.7.6"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-3733",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Elgg 1.7.6 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by vendors/simpletest/test/visual_test.php and certain other files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
            },
            {
              "name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/elgg-1.7.6",
              "refsource": "MISC",
              "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/elgg-1.7.6"
            },
            {
              "name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
              "refsource": "MISC",
              "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-3733",
    "datePublished": "2011-09-23T23:00:00Z",
    "dateReserved": "2011-09-23T00:00:00Z",
    "dateUpdated": "2024-09-16T21:07:26.121Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-6561 (GCVE-0-2012-6561)
Vulnerability from cvelistv5
Published
2013-05-23 15:00
Modified
2024-08-06 21:36
Severity ?
CWE
  • n/a
Summary
Cross-site scripting (XSS) vulnerability in engine/lib/views.php in Elgg before 1.8.5 allows remote attackers to inject arbitrary web script or HTML via the view parameter to index.php. NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:36:00.314Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released"
          },
          {
            "name": "49129",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49129"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip"
          },
          {
            "name": "53623",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53623"
          },
          {
            "name": "elgg-index-xss(75756)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75756"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in engine/lib/views.php in Elgg before 1.8.5 allows remote attackers to inject arbitrary web script or HTML via the view parameter to index.php.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released"
        },
        {
          "name": "49129",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49129"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip"
        },
        {
          "name": "53623",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53623"
        },
        {
          "name": "elgg-index-xss(75756)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75756"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-6561",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in engine/lib/views.php in Elgg before 1.8.5 allows remote attackers to inject arbitrary web script or HTML via the view parameter to index.php.  NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released",
              "refsource": "CONFIRM",
              "url": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released"
            },
            {
              "name": "49129",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49129"
            },
            {
              "name": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip",
              "refsource": "CONFIRM",
              "url": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip"
            },
            {
              "name": "53623",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53623"
            },
            {
              "name": "elgg-index-xss(75756)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75756"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-6561",
    "datePublished": "2013-05-23T15:00:00",
    "dateReserved": "2013-05-23T00:00:00",
    "dateUpdated": "2024-08-06T21:36:00.314Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-6562 (GCVE-0-2012-6562)
Vulnerability from cvelistv5
Published
2013-05-23 15:00
Modified
2024-08-06 21:36
Severity ?
CWE
  • n/a
Summary
engine/lib/users.php in Elgg before 1.8.5 does not properly specify permissions for the useradd action, which allows remote attackers to create arbitrary accounts.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:36:00.283Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released"
          },
          {
            "name": "49129",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49129"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip"
          },
          {
            "name": "53623",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53623"
          },
          {
            "name": "elgg-multiple-security-bypass(75757)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75757"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "engine/lib/users.php in Elgg before 1.8.5 does not properly specify permissions for the useradd action, which allows remote attackers to create arbitrary accounts."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released"
        },
        {
          "name": "49129",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49129"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip"
        },
        {
          "name": "53623",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53623"
        },
        {
          "name": "elgg-multiple-security-bypass(75757)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75757"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-6562",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "engine/lib/users.php in Elgg before 1.8.5 does not properly specify permissions for the useradd action, which allows remote attackers to create arbitrary accounts."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released",
              "refsource": "CONFIRM",
              "url": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released"
            },
            {
              "name": "49129",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49129"
            },
            {
              "name": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip",
              "refsource": "CONFIRM",
              "url": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip"
            },
            {
              "name": "53623",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53623"
            },
            {
              "name": "elgg-multiple-security-bypass(75757)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75757"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-6562",
    "datePublished": "2013-05-23T15:00:00",
    "dateReserved": "2013-05-23T00:00:00",
    "dateUpdated": "2024-08-06T21:36:00.283Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-6563 (GCVE-0-2012-6563)
Vulnerability from cvelistv5
Published
2013-05-23 15:00
Modified
2024-08-06 21:36
Severity ?
CWE
  • n/a
Summary
engine/lib/access.php in Elgg before 1.8.5 does not properly clear cached access lists during plugin boot, which allows remote attackers to read private entities via unspecified vectors.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:36:01.037Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released"
          },
          {
            "name": "49129",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49129"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip"
          },
          {
            "name": "53623",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53623"
          },
          {
            "name": "elgg-multiple-security-bypass(75757)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75757"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "engine/lib/access.php in Elgg before 1.8.5 does not properly clear cached access lists during plugin boot, which allows remote attackers to read private entities via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released"
        },
        {
          "name": "49129",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49129"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip"
        },
        {
          "name": "53623",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53623"
        },
        {
          "name": "elgg-multiple-security-bypass(75757)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75757"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-6563",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "engine/lib/access.php in Elgg before 1.8.5 does not properly clear cached access lists during plugin boot, which allows remote attackers to read private entities via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released",
              "refsource": "CONFIRM",
              "url": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released"
            },
            {
              "name": "49129",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49129"
            },
            {
              "name": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip",
              "refsource": "CONFIRM",
              "url": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip"
            },
            {
              "name": "53623",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53623"
            },
            {
              "name": "elgg-multiple-security-bypass(75757)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75757"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-6563",
    "datePublished": "2013-05-23T15:00:00",
    "dateReserved": "2013-05-23T00:00:00",
    "dateUpdated": "2024-08-06T21:36:01.037Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-4072 (GCVE-0-2021-4072)
Vulnerability from cvelistv5
Published
2021-12-24 13:25
Modified
2024-08-03 17:16
Severity ?
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Impacted products
Vendor Product Version
elgg elgg/elgg Version: unspecified   < 3.3.24
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:16:03.730Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://huntr.dev/bounties/74034253-732a-4251-a0f9-eca5f576c955"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "elgg/elgg",
          "vendor": "elgg",
          "versions": [
            {
              "lessThan": "3.3.24",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "elgg is vulnerable to Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-24T13:25:09",
        "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
        "shortName": "@huntrdev"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://huntr.dev/bounties/74034253-732a-4251-a0f9-eca5f576c955"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0"
        }
      ],
      "source": {
        "advisory": "74034253-732a-4251-a0f9-eca5f576c955",
        "discovery": "EXTERNAL"
      },
      "title": "Cross-site Scripting (XSS) - Stored in elgg/elgg",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@huntr.dev",
          "ID": "CVE-2021-4072",
          "STATE": "PUBLIC",
          "TITLE": "Cross-site Scripting (XSS) - Stored in elgg/elgg"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "elgg/elgg",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "3.3.24"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "elgg"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "elgg is vulnerable to Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://huntr.dev/bounties/74034253-732a-4251-a0f9-eca5f576c955",
              "refsource": "CONFIRM",
              "url": "https://huntr.dev/bounties/74034253-732a-4251-a0f9-eca5f576c955"
            },
            {
              "name": "https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0",
              "refsource": "MISC",
              "url": "https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0"
            }
          ]
        },
        "source": {
          "advisory": "74034253-732a-4251-a0f9-eca5f576c955",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
    "assignerShortName": "@huntrdev",
    "cveId": "CVE-2021-4072",
    "datePublished": "2021-12-24T13:25:09",
    "dateReserved": "2021-12-06T00:00:00",
    "dateUpdated": "2024-08-03T17:16:03.730Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-0234 (GCVE-0-2013-0234)
Vulnerability from cvelistv5
Published
2014-02-02 20:00
Modified
2024-08-06 14:18
Severity ?
CWE
  • n/a
Summary
Cross-site scripting (XSS) vulnerability in the Twitter widget in Elgg before 1.7.17 and 1.8.x before 1.8.13 allows remote attackers to inject arbitrary web script or HTML via the params[twitter_username] parameter to action/widgets/save.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:18:09.479Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://blog.elgg.org/pg/blog/cash/read/223/elgg-1813-and-1717"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/119903/Elgg-Twitter-Widget-Cross-Site-Scripting.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/Elgg/Elgg/commit/a74a88501c41e89c8bcd7fc650ae2f8cc0a5003d#L2L21"
          },
          {
            "name": "20130129 XSS in Elgg 1.8.12, 1.7.16 (core module \"Twitter widget\")",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2013/Jan/251"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/Elgg/Elgg/commit/19dc507c2fccb378be2a44a762edf6c1e7afa334#L0R11"
          },
          {
            "name": "[oss-security] 20130128 Re: CVE Request: XSS in Elgg 1.8.12, 1.7.16 (core module \"Twitter widget\")",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/01/29/4"
          },
          {
            "name": "52007",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/52007"
          },
          {
            "name": "57569",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/57569"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-01-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Twitter widget in Elgg before 1.7.17 and 1.8.x before 1.8.13 allows remote attackers to inject arbitrary web script or HTML via the params[twitter_username] parameter to action/widgets/save."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-02-02T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://blog.elgg.org/pg/blog/cash/read/223/elgg-1813-and-1717"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/119903/Elgg-Twitter-Widget-Cross-Site-Scripting.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/Elgg/Elgg/commit/a74a88501c41e89c8bcd7fc650ae2f8cc0a5003d#L2L21"
        },
        {
          "name": "20130129 XSS in Elgg 1.8.12, 1.7.16 (core module \"Twitter widget\")",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2013/Jan/251"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/Elgg/Elgg/commit/19dc507c2fccb378be2a44a762edf6c1e7afa334#L0R11"
        },
        {
          "name": "[oss-security] 20130128 Re: CVE Request: XSS in Elgg 1.8.12, 1.7.16 (core module \"Twitter widget\")",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/01/29/4"
        },
        {
          "name": "52007",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/52007"
        },
        {
          "name": "57569",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/57569"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-0234",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Twitter widget in Elgg before 1.7.17 and 1.8.x before 1.8.13 allows remote attackers to inject arbitrary web script or HTML via the params[twitter_username] parameter to action/widgets/save."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://blog.elgg.org/pg/blog/cash/read/223/elgg-1813-and-1717",
              "refsource": "CONFIRM",
              "url": "http://blog.elgg.org/pg/blog/cash/read/223/elgg-1813-and-1717"
            },
            {
              "name": "http://packetstormsecurity.com/files/119903/Elgg-Twitter-Widget-Cross-Site-Scripting.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/119903/Elgg-Twitter-Widget-Cross-Site-Scripting.html"
            },
            {
              "name": "https://github.com/Elgg/Elgg/commit/a74a88501c41e89c8bcd7fc650ae2f8cc0a5003d#L2L21",
              "refsource": "CONFIRM",
              "url": "https://github.com/Elgg/Elgg/commit/a74a88501c41e89c8bcd7fc650ae2f8cc0a5003d#L2L21"
            },
            {
              "name": "20130129 XSS in Elgg 1.8.12, 1.7.16 (core module \"Twitter widget\")",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2013/Jan/251"
            },
            {
              "name": "https://github.com/Elgg/Elgg/commit/19dc507c2fccb378be2a44a762edf6c1e7afa334#L0R11",
              "refsource": "CONFIRM",
              "url": "https://github.com/Elgg/Elgg/commit/19dc507c2fccb378be2a44a762edf6c1e7afa334#L0R11"
            },
            {
              "name": "[oss-security] 20130128 Re: CVE Request: XSS in Elgg 1.8.12, 1.7.16 (core module \"Twitter widget\")",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/01/29/4"
            },
            {
              "name": "52007",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/52007"
            },
            {
              "name": "57569",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/57569"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-0234",
    "datePublished": "2014-02-02T20:00:00",
    "dateReserved": "2012-12-06T00:00:00",
    "dateUpdated": "2024-08-06T14:18:09.479Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-3980 (GCVE-0-2021-3980)
Vulnerability from cvelistv5
Published
2021-12-03 15:05
Modified
2024-08-03 17:09
CWE
  • CWE-359 - Exposure of Private Personal Information to an Unauthorized Actor
Summary
elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor
Impacted products
Vendor Product Version
elgg elgg/elgg Version: unspecified   < 3.3.23
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:09:09.747Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "elgg/elgg",
          "vendor": "elgg",
          "versions": [
            {
              "lessThan": "3.3.23",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor"
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-359",
              "description": "CWE-359 Exposure of Private Personal Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-03T15:05:10",
        "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
        "shortName": "@huntrdev"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126"
        }
      ],
      "source": {
        "advisory": "1f43f11e-4bd8-451f-a244-dc9541cdc0ac",
        "discovery": "EXTERNAL"
      },
      "title": "Exposure of Private Personal Information to an Unauthorized Actor in elgg/elgg",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@huntr.dev",
          "ID": "CVE-2021-3980",
          "STATE": "PUBLIC",
          "TITLE": "Exposure of Private Personal Information to an Unauthorized Actor in elgg/elgg"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "elgg/elgg",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "3.3.23"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "elgg"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor"
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-359 Exposure of Private Personal Information to an Unauthorized Actor"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac",
              "refsource": "CONFIRM",
              "url": "https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac"
            },
            {
              "name": "https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126",
              "refsource": "MISC",
              "url": "https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126"
            }
          ]
        },
        "source": {
          "advisory": "1f43f11e-4bd8-451f-a244-dc9541cdc0ac",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
    "assignerShortName": "@huntrdev",
    "cveId": "CVE-2021-3980",
    "datePublished": "2021-12-03T15:05:10",
    "dateReserved": "2021-11-19T00:00:00",
    "dateUpdated": "2024-08-03T17:09:09.747Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-3964 (GCVE-0-2021-3964)
Vulnerability from cvelistv5
Published
2021-12-01 11:25
Modified
2024-08-03 17:09
CWE
  • CWE-639 - Authorization Bypass Through User-Controlled Key
Summary
elgg is vulnerable to Authorization Bypass Through User-Controlled Key
Impacted products
Vendor Product Version
elgg elgg/elgg Version: unspecified   < 3.3.22
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:09:09.679Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "elgg/elgg",
          "vendor": "elgg",
          "versions": [
            {
              "lessThan": "3.3.22",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "elgg is vulnerable to Authorization Bypass Through User-Controlled Key"
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-639",
              "description": "CWE-639 Authorization Bypass Through User-Controlled Key",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-01T11:25:10",
        "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
        "shortName": "@huntrdev"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744"
        }
      ],
      "source": {
        "advisory": "a4df45d6-b739-4299-967f-c960b569383a",
        "discovery": "EXTERNAL"
      },
      "title": "Authorization Bypass Through User-Controlled Key in elgg/elgg",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@huntr.dev",
          "ID": "CVE-2021-3964",
          "STATE": "PUBLIC",
          "TITLE": "Authorization Bypass Through User-Controlled Key in elgg/elgg"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "elgg/elgg",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "3.3.22"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "elgg"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "elgg is vulnerable to Authorization Bypass Through User-Controlled Key"
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-639 Authorization Bypass Through User-Controlled Key"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a",
              "refsource": "CONFIRM",
              "url": "https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a"
            },
            {
              "name": "https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744",
              "refsource": "MISC",
              "url": "https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744"
            }
          ]
        },
        "source": {
          "advisory": "a4df45d6-b739-4299-967f-c960b569383a",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
    "assignerShortName": "@huntrdev",
    "cveId": "CVE-2021-3964",
    "datePublished": "2021-12-01T11:25:10",
    "dateReserved": "2021-11-16T00:00:00",
    "dateUpdated": "2024-08-03T17:09:09.679Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-11016 (GCVE-0-2019-11016)
Vulnerability from cvelistv5
Published
2019-04-08 20:13
Modified
2024-08-04 22:40
Severity ?
CWE
  • n/a
Summary
Elgg before 1.12.18 and 2.3.x before 2.3.11 has an open redirect.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:40:15.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://elgg.org/blog/view/2913744/security-release-elgg-11218-and-2311"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/Elgg/Elgg/releases/tag/1.12.18"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/Elgg/Elgg/releases/tag/2.3.11"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Elgg before 1.12.18 and 2.3.x before 2.3.11 has an open redirect."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-04-08T20:13:25",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://elgg.org/blog/view/2913744/security-release-elgg-11218-and-2311"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Elgg/Elgg/releases/tag/1.12.18"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Elgg/Elgg/releases/tag/2.3.11"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-11016",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Elgg before 1.12.18 and 2.3.x before 2.3.11 has an open redirect."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://elgg.org/blog/view/2913744/security-release-elgg-11218-and-2311",
              "refsource": "MISC",
              "url": "https://elgg.org/blog/view/2913744/security-release-elgg-11218-and-2311"
            },
            {
              "name": "https://github.com/Elgg/Elgg/releases/tag/1.12.18",
              "refsource": "MISC",
              "url": "https://github.com/Elgg/Elgg/releases/tag/1.12.18"
            },
            {
              "name": "https://github.com/Elgg/Elgg/releases/tag/2.3.11",
              "refsource": "MISC",
              "url": "https://github.com/Elgg/Elgg/releases/tag/2.3.11"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-11016",
    "datePublished": "2019-04-08T20:13:25",
    "dateReserved": "2019-04-08T00:00:00",
    "dateUpdated": "2024-08-04T22:40:15.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2936 (GCVE-0-2011-2936)
Vulnerability from cvelistv5
Published
2019-11-12 13:47
Modified
2024-08-06 23:15
Severity ?
CWE
  • unspecified
Summary
Elgg through 1.7.10 has a SQL injection vulnerability
Impacted products
Vendor Product Version
Elgg Elgg Version: through 1.7.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.913Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities"
          },
          {
            "name": "Debian",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://security-tracker.debian.org/tracker/CVE-2011-2936"
          },
          {
            "name": "Red Hat",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/cve-2011-2936"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Elgg",
          "vendor": "Elgg",
          "versions": [
            {
              "status": "affected",
              "version": "through 1.7.10"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Elgg through 1.7.10 has a SQL injection vulnerability"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "unspecified",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-12T13:47:57",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities"
        },
        {
          "name": "Debian",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://security-tracker.debian.org/tracker/CVE-2011-2936"
        },
        {
          "name": "Red Hat",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/cve-2011-2936"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-2936",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Elgg",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "through 1.7.10"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Elgg"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Elgg through 1.7.10 has a SQL injection vulnerability"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "unspecified"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities",
              "refsource": "MISC",
              "url": "https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities"
            },
            {
              "name": "Debian",
              "refsource": "DEBIAN",
              "url": "https://security-tracker.debian.org/tracker/CVE-2011-2936"
            },
            {
              "name": "Red Hat",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/security/cve/cve-2011-2936"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2936",
    "datePublished": "2019-11-12T13:47:57",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.913Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2021-12-24 14:15
Modified
2024-11-21 06:36
Summary
elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Impacted products
Vendor Product Version
elgg elgg *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70C7A42D-7B0A-4E60-B21A-6545A72F3B30",
              "versionEndExcluding": "3.3.24",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "elgg is vulnerable to Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
    },
    {
      "lang": "es",
      "value": "elgg es vulnerable a una Neutralizaci\u00f3n Inapropiada de Entradas Durante la Generaci\u00f3n de P\u00e1ginas Web (\"Cross-site Scripting\")"
    }
  ],
  "id": "CVE-2021-4072",
  "lastModified": "2024-11-21T06:36:50.880",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "security@huntr.dev",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-12-24T14:15:07.327",
  "references": [
    {
      "source": "security@huntr.dev",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0"
    },
    {
      "source": "security@huntr.dev",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://huntr.dev/bounties/74034253-732a-4251-a0f9-eca5f576c955"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://huntr.dev/bounties/74034253-732a-4251-a0f9-eca5f576c955"
    }
  ],
  "sourceIdentifier": "security@huntr.dev",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@huntr.dev",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-05-23 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
engine/lib/access.php in Elgg before 1.8.5 does not properly clear cached access lists during plugin boot, which allows remote attackers to read private entities via unspecified vectors.
Impacted products
Vendor Product Version
elgg elgg *
elgg elgg 1.7.0
elgg elgg 1.7.1
elgg elgg 1.7.2
elgg elgg 1.7.3
elgg elgg 1.7.4
elgg elgg 1.7.5
elgg elgg 1.7.6
elgg elgg 1.7.7
elgg elgg 1.7.8
elgg elgg 1.7.9
elgg elgg 1.7.10
elgg elgg 1.7.11
elgg elgg 1.7.12
elgg elgg 1.7.13
elgg elgg 1.7.14
elgg elgg 1.7.15
elgg elgg 1.7.16
elgg elgg 1.7.17
elgg elgg 1.7.18
elgg elgg 1.8.0.1
elgg elgg 1.8.1
elgg elgg 1.8.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF23055F-E32F-47ED-9B11-B8F58518ED32",
              "versionEndIncluding": "1.8.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C80BB5F-1E77-4202-A4D3-3D96FA0969ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D07839A-E8E3-4C7C-9A05-C359FF9A2819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E34DCD3E-7A8D-4A97-838A-D5A0159068EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "663F1815-EAF8-40A3-BAC8-29E359245972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BFE9E2-F931-4197-97CA-5D58FBB763B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "779523EE-7B82-4E10-ABC5-A64D9C0EDBE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7816C52C-5360-4987-8975-9C9C9EFCACBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7AB456D-F688-4E0C-920E-E70C3351A463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDD08B0-FA37-4E81-BD79-8107F8EA5EBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0658B074-66D8-410C-AB08-BC6C7A79B2FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D49A2-A15A-41A8-A3C3-801F608E7345",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D7D1917-81AB-46C4-9176-6961A0FBCA6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3EC5E77-D90E-451F-BB00-20DBEBDD6FAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6383A2DA-20C8-484B-854A-D4A885D1E50A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7509A5-1413-4BAD-93C7-92EE464BCFA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "1729E9B0-AE66-49FA-A74F-8C0622DE0962",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2079FBBD-1802-4AC8-B40C-F543D03D8A1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFF01033-1BE8-45FC-B631-31E65BC8E6A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9BCD0C-C890-470A-B185-97301A58712F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6869E5FD-652D-4927-A21B-F530996DFD91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E19B1613-CF87-4219-82CD-DA84FEB68F4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C39479E6-2E23-403E-B2CE-FA169C821EE9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "engine/lib/access.php in Elgg before 1.8.5 does not properly clear cached access lists during plugin boot, which allows remote attackers to read private entities via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "engine/lib/access.php en Elgg v1.8.5 antes no se borra las listas de acceso en cach\u00e9 correctamente durante el arranque del complemento, lo que permite a atacantes remotos leer las entidades privadas a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2012-6563",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-05-23T15:55:02.477",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49129"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/53623"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75757"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49129"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53623"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75757"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-12 14:15
Modified
2024-11-21 01:29
Summary
Elgg through 1.7.10 has XSS
Impacted products
Vendor Product Version
elgg elgg *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B103AD7E-313B-45C8-933F-D1BBB1152A24",
              "versionEndIncluding": "1.7.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Elgg through 1.7.10 has XSS"
    },
    {
      "lang": "es",
      "value": "Elgg versiones hasta 1.7.10, presenta una vulnerabilidad de tipo XSS."
    }
  ],
  "id": "CVE-2011-2935",
  "lastModified": "2024-11-21T01:29:18.713",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-12T14:15:10.593",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Not Applicable",
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/cve-2011-2935"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2011-2935"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable",
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/cve-2011-2935"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2011-2935"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-12 14:15
Modified
2024-11-21 01:29
Severity ?
Summary
Elgg through 1.7.10 has a SQL injection vulnerability
Impacted products
Vendor Product Version
elgg elgg *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B103AD7E-313B-45C8-933F-D1BBB1152A24",
              "versionEndIncluding": "1.7.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Elgg through 1.7.10 has a SQL injection vulnerability"
    },
    {
      "lang": "es",
      "value": "Elgg versiones hasta 1.7.10, presenta una vulnerabilidad de inyecci\u00f3n SQL."
    }
  ],
  "id": "CVE-2011-2936",
  "lastModified": "2024-11-21T01:29:18.833",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-12T14:15:10.657",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Not Applicable",
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/cve-2011-2936"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2011-2936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable",
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/cve-2011-2936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2011-2936"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-09-23 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Elgg 1.7.6 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by vendors/simpletest/test/visual_test.php and certain other files.
Impacted products
Vendor Product Version
elgg elgg 1.7.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7816C52C-5360-4987-8975-9C9C9EFCACBB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Elgg 1.7.6 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by vendors/simpletest/test/visual_test.php and certain other files."
    },
    {
      "lang": "es",
      "value": "Elgg v1.7.6 permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una petici\u00f3n directa a un archivo .php, lo que revela la ruta de instalaci\u00f3n en un mensaje de error, como se demostr\u00f3 con vendors/simpletest/test/visual_test.php y algunos otros archivos."
    }
  ],
  "id": "CVE-2011-3733",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-09-23T23:55:03.257",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/elgg-1.7.6"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/elgg-1.7.6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-04-08 21:29
Modified
2024-11-21 04:20
Summary
Elgg before 1.12.18 and 2.3.x before 2.3.11 has an open redirect.
Impacted products
Vendor Product Version
elgg elgg *
elgg elgg *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D1019E5-D256-441A-AA47-3063FB453762",
              "versionEndExcluding": "1.12.18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F164384D-A38F-4243-92DE-A97818FF380E",
              "versionEndExcluding": "2.3.11",
              "versionStartIncluding": "2.3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Elgg before 1.12.18 and 2.3.x before 2.3.11 has an open redirect."
    },
    {
      "lang": "es",
      "value": "Elgg anterior a versi\u00f3n 1.12.18 y versi\u00f3n 2.3.x anterior a versi\u00f3n 2.3.11, presenta un redireccionamiento abierto."
    }
  ],
  "id": "CVE-2019-11016",
  "lastModified": "2024-11-21T04:20:21.990",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-04-08T21:29:01.297",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://elgg.org/blog/view/2913744/security-release-elgg-11218-and-2311"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/Elgg/Elgg/releases/tag/1.12.18"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/Elgg/Elgg/releases/tag/2.3.11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://elgg.org/blog/view/2913744/security-release-elgg-11218-and-2311"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/Elgg/Elgg/releases/tag/1.12.18"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/Elgg/Elgg/releases/tag/2.3.11"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-601"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-12-01 12:15
Modified
2024-11-21 06:23
Summary
elgg is vulnerable to Authorization Bypass Through User-Controlled Key
Impacted products
Vendor Product Version
elgg elgg *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D8518D-4978-4E8D-A10E-1DA5DCDB757B",
              "versionEndExcluding": "3.3.22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "elgg is vulnerable to Authorization Bypass Through User-Controlled Key"
    },
    {
      "lang": "es",
      "value": "elgg es vulnerable a una Omisi\u00f3n de Autorizaci\u00f3n Mediante una Clave Controlada por el Usuario"
    }
  ],
  "id": "CVE-2021-3964",
  "lastModified": "2024-11-21T06:23:14.783",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "security@huntr.dev",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-12-01T12:15:07.627",
  "references": [
    {
      "source": "security@huntr.dev",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744"
    },
    {
      "source": "security@huntr.dev",
      "tags": [
        "Exploit",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a"
    }
  ],
  "sourceIdentifier": "security@huntr.dev",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-639"
        }
      ],
      "source": "security@huntr.dev",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-02-02 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Twitter widget in Elgg before 1.7.17 and 1.8.x before 1.8.13 allows remote attackers to inject arbitrary web script or HTML via the params[twitter_username] parameter to action/widgets/save.
References
secalert@redhat.comhttp://blog.elgg.org/pg/blog/cash/read/223/elgg-1813-and-1717
secalert@redhat.comhttp://packetstormsecurity.com/files/119903/Elgg-Twitter-Widget-Cross-Site-Scripting.html
secalert@redhat.comhttp://seclists.org/fulldisclosure/2013/Jan/251
secalert@redhat.comhttp://secunia.com/advisories/52007Vendor Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2013/01/29/4
secalert@redhat.comhttp://www.securityfocus.com/bid/57569
secalert@redhat.comhttps://github.com/Elgg/Elgg/commit/19dc507c2fccb378be2a44a762edf6c1e7afa334#L0R11Exploit, Patch
secalert@redhat.comhttps://github.com/Elgg/Elgg/commit/a74a88501c41e89c8bcd7fc650ae2f8cc0a5003d#L2L21
af854a3a-2127-422b-91ae-364da2661108http://blog.elgg.org/pg/blog/cash/read/223/elgg-1813-and-1717
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/119903/Elgg-Twitter-Widget-Cross-Site-Scripting.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2013/Jan/251
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/52007Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2013/01/29/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/57569
af854a3a-2127-422b-91ae-364da2661108https://github.com/Elgg/Elgg/commit/19dc507c2fccb378be2a44a762edf6c1e7afa334#L0R11Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/Elgg/Elgg/commit/a74a88501c41e89c8bcd7fc650ae2f8cc0a5003d#L2L21
Impacted products
Vendor Product Version
elgg elgg 1.8.0.1
elgg elgg 1.8.1
elgg elgg 1.8.3
elgg elgg 1.8.4
elgg elgg 1.8.5
elgg elgg 1.8.6
elgg elgg 1.8.7
elgg elgg 1.8.8
elgg elgg 1.8.9
elgg elgg 1.8.10
elgg elgg 1.8.11
elgg elgg 1.8.12
elgg elgg *
elgg elgg 1.7.0
elgg elgg 1.7.1
elgg elgg 1.7.2
elgg elgg 1.7.3
elgg elgg 1.7.4
elgg elgg 1.7.5
elgg elgg 1.7.6
elgg elgg 1.7.7
elgg elgg 1.7.8
elgg elgg 1.7.9
elgg elgg 1.7.10
elgg elgg 1.7.11
elgg elgg 1.7.12
elgg elgg 1.7.13
elgg elgg 1.7.14
elgg elgg 1.7.15
elgg elgg 1.7.18



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6869E5FD-652D-4927-A21B-F530996DFD91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E19B1613-CF87-4219-82CD-DA84FEB68F4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C39479E6-2E23-403E-B2CE-FA169C821EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "700764BA-53D8-4A6E-80EF-44078DAC2E18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0A30CD-8C5F-4D85-B33A-03F9F892295F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F670FE1-72D3-4A43-9904-92C3733E8CF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5126341-4736-4AC3-B2ED-4D2125BE86CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAAAF911-37AA-46CB-BB88-64E7F5F13BAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "074D8D36-98F1-4F44-AA0C-B314F0F3C134",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA40AE9-CC39-4909-82A4-96C1F0498113",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BA0909F-5A67-4E9A-A0D9-10B6080750CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "499100B2-DBF7-49A3-BD96-9F45BCAEE8B7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCA01032-958F-4B24-BC92-88D938575660",
              "versionEndIncluding": "1.7.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C80BB5F-1E77-4202-A4D3-3D96FA0969ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D07839A-E8E3-4C7C-9A05-C359FF9A2819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E34DCD3E-7A8D-4A97-838A-D5A0159068EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "663F1815-EAF8-40A3-BAC8-29E359245972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BFE9E2-F931-4197-97CA-5D58FBB763B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "779523EE-7B82-4E10-ABC5-A64D9C0EDBE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7816C52C-5360-4987-8975-9C9C9EFCACBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7AB456D-F688-4E0C-920E-E70C3351A463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDD08B0-FA37-4E81-BD79-8107F8EA5EBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0658B074-66D8-410C-AB08-BC6C7A79B2FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D49A2-A15A-41A8-A3C3-801F608E7345",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D7D1917-81AB-46C4-9176-6961A0FBCA6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3EC5E77-D90E-451F-BB00-20DBEBDD6FAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6383A2DA-20C8-484B-854A-D4A885D1E50A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7509A5-1413-4BAD-93C7-92EE464BCFA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "1729E9B0-AE66-49FA-A74F-8C0622DE0962",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9BCD0C-C890-470A-B185-97301A58712F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Twitter widget in Elgg before 1.7.17 and 1.8.x before 1.8.13 allows remote attackers to inject arbitrary web script or HTML via the params[twitter_username] parameter to action/widgets/save."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad XSS en el widget de Twitter en Elgg anterior a 1.7.17 y 1.8.x anterior a 1.8.13 permite a atacantes remotos inyectar script Web o HTML arbitrario a trav\u00e9s del par\u00e1metro params[twitter_username] hacia action/widget/save."
    }
  ],
  "id": "CVE-2013-0234",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-02-02T20:55:14.133",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://blog.elgg.org/pg/blog/cash/read/223/elgg-1813-and-1717"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://packetstormsecurity.com/files/119903/Elgg-Twitter-Widget-Cross-Site-Scripting.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/fulldisclosure/2013/Jan/251"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/52007"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2013/01/29/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/57569"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/Elgg/Elgg/commit/19dc507c2fccb378be2a44a762edf6c1e7afa334#L0R11"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://github.com/Elgg/Elgg/commit/a74a88501c41e89c8bcd7fc650ae2f8cc0a5003d#L2L21"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://blog.elgg.org/pg/blog/cash/read/223/elgg-1813-and-1717"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.com/files/119903/Elgg-Twitter-Widget-Cross-Site-Scripting.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2013/Jan/251"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/52007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/01/29/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/57569"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/Elgg/Elgg/commit/19dc507c2fccb378be2a44a762edf6c1e7afa334#L0R11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/Elgg/Elgg/commit/a74a88501c41e89c8bcd7fc650ae2f8cc0a5003d#L2L21"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-05-23 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
engine/lib/users.php in Elgg before 1.8.5 does not properly specify permissions for the useradd action, which allows remote attackers to create arbitrary accounts.
Impacted products
Vendor Product Version
elgg elgg *
elgg elgg 1.7.0
elgg elgg 1.7.1
elgg elgg 1.7.2
elgg elgg 1.7.3
elgg elgg 1.7.4
elgg elgg 1.7.5
elgg elgg 1.7.6
elgg elgg 1.7.7
elgg elgg 1.7.8
elgg elgg 1.7.9
elgg elgg 1.7.10
elgg elgg 1.7.11
elgg elgg 1.7.12
elgg elgg 1.7.13
elgg elgg 1.7.14
elgg elgg 1.7.15
elgg elgg 1.7.16
elgg elgg 1.7.17
elgg elgg 1.7.18
elgg elgg 1.8.0.1
elgg elgg 1.8.1
elgg elgg 1.8.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF23055F-E32F-47ED-9B11-B8F58518ED32",
              "versionEndIncluding": "1.8.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C80BB5F-1E77-4202-A4D3-3D96FA0969ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D07839A-E8E3-4C7C-9A05-C359FF9A2819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E34DCD3E-7A8D-4A97-838A-D5A0159068EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "663F1815-EAF8-40A3-BAC8-29E359245972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BFE9E2-F931-4197-97CA-5D58FBB763B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "779523EE-7B82-4E10-ABC5-A64D9C0EDBE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7816C52C-5360-4987-8975-9C9C9EFCACBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7AB456D-F688-4E0C-920E-E70C3351A463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDD08B0-FA37-4E81-BD79-8107F8EA5EBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0658B074-66D8-410C-AB08-BC6C7A79B2FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D49A2-A15A-41A8-A3C3-801F608E7345",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D7D1917-81AB-46C4-9176-6961A0FBCA6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3EC5E77-D90E-451F-BB00-20DBEBDD6FAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6383A2DA-20C8-484B-854A-D4A885D1E50A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7509A5-1413-4BAD-93C7-92EE464BCFA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "1729E9B0-AE66-49FA-A74F-8C0622DE0962",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2079FBBD-1802-4AC8-B40C-F543D03D8A1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFF01033-1BE8-45FC-B631-31E65BC8E6A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9BCD0C-C890-470A-B185-97301A58712F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6869E5FD-652D-4927-A21B-F530996DFD91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E19B1613-CF87-4219-82CD-DA84FEB68F4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C39479E6-2E23-403E-B2CE-FA169C821EE9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "engine/lib/users.php in Elgg before 1.8.5 does not properly specify permissions for the useradd action, which allows remote attackers to create arbitrary accounts."
    },
    {
      "lang": "es",
      "value": "engine/lib/users.php en Elgg antes de v1.8.5 no especifica correctamente los permisos para la acci\u00f3n useradd, que permite a atacantes remotos crear cuentas arbitrarias."
    }
  ],
  "id": "CVE-2012-6562",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-05-23T15:55:02.447",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49129"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/53623"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75757"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49129"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53623"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75757"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-12-03 15:15
Modified
2024-11-21 06:23
Summary
elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor
Impacted products
Vendor Product Version
elgg elgg *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B8506A2-6432-4862-AF3C-E432C4CC1BA6",
              "versionEndExcluding": "3.3.23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor"
    },
    {
      "lang": "es",
      "value": "elgg es vulnerable a una Exposici\u00f3n de Informaci\u00f3n Personal Privada a un Actor no Autorizado"
    }
  ],
  "id": "CVE-2021-3980",
  "lastModified": "2024-11-21T06:23:17.890",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "security@huntr.dev",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-12-03T15:15:08.353",
  "references": [
    {
      "source": "security@huntr.dev",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126"
    },
    {
      "source": "security@huntr.dev",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac"
    }
  ],
  "sourceIdentifier": "security@huntr.dev",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-359"
        }
      ],
      "source": "security@huntr.dev",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-05-23 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in engine/lib/views.php in Elgg before 1.8.5 allows remote attackers to inject arbitrary web script or HTML via the view parameter to index.php. NOTE: some of these details are obtained from third party information.
Impacted products
Vendor Product Version
elgg elgg *
elgg elgg 1.7.0
elgg elgg 1.7.1
elgg elgg 1.7.2
elgg elgg 1.7.3
elgg elgg 1.7.4
elgg elgg 1.7.5
elgg elgg 1.7.6
elgg elgg 1.7.7
elgg elgg 1.7.8
elgg elgg 1.7.9
elgg elgg 1.7.10
elgg elgg 1.7.11
elgg elgg 1.7.12
elgg elgg 1.7.13
elgg elgg 1.7.14
elgg elgg 1.7.15
elgg elgg 1.7.16
elgg elgg 1.7.17
elgg elgg 1.7.18
elgg elgg 1.8.0.1
elgg elgg 1.8.1
elgg elgg 1.8.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF23055F-E32F-47ED-9B11-B8F58518ED32",
              "versionEndIncluding": "1.8.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C80BB5F-1E77-4202-A4D3-3D96FA0969ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D07839A-E8E3-4C7C-9A05-C359FF9A2819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E34DCD3E-7A8D-4A97-838A-D5A0159068EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "663F1815-EAF8-40A3-BAC8-29E359245972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BFE9E2-F931-4197-97CA-5D58FBB763B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "779523EE-7B82-4E10-ABC5-A64D9C0EDBE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7816C52C-5360-4987-8975-9C9C9EFCACBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7AB456D-F688-4E0C-920E-E70C3351A463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDD08B0-FA37-4E81-BD79-8107F8EA5EBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0658B074-66D8-410C-AB08-BC6C7A79B2FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D49A2-A15A-41A8-A3C3-801F608E7345",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D7D1917-81AB-46C4-9176-6961A0FBCA6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3EC5E77-D90E-451F-BB00-20DBEBDD6FAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6383A2DA-20C8-484B-854A-D4A885D1E50A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7509A5-1413-4BAD-93C7-92EE464BCFA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "1729E9B0-AE66-49FA-A74F-8C0622DE0962",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2079FBBD-1802-4AC8-B40C-F543D03D8A1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFF01033-1BE8-45FC-B631-31E65BC8E6A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.7.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9BCD0C-C890-470A-B185-97301A58712F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6869E5FD-652D-4927-A21B-F530996DFD91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E19B1613-CF87-4219-82CD-DA84FEB68F4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:elgg:elgg:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C39479E6-2E23-403E-B2CE-FA169C821EE9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in engine/lib/views.php in Elgg before 1.8.5 allows remote attackers to inject arbitrary web script or HTML via the view parameter to index.php.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en engine/lib/views.php en Elgg antes de v1.8.5 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro a fin de index.php. NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2012-6561",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-05-23T15:55:02.423",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49129"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/53623"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75756"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://blog.elgg.org/pg/blog/evan/read/209/elgg-185-released"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49129"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53623"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75756"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}