fkie_cve-2013-5855
Vulnerability from fkie_nvd
Published
2014-07-17 05:10
Modified
2025-04-12 10:46
Severity ?
Summary
Oracle Mojarra 2.2.x before 2.2.6 and 2.1.x before 2.1.28 does not perform appropriate encoding when a (1) <h:outputText> tag or (2) EL expression is used after a scriptor style block, which allows remote attackers to conduct cross-site scripting (XSS) attacks via application-specific vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | mojarra | 2.1.0 | |
oracle | mojarra | 2.1.1 | |
oracle | mojarra | 2.1.2 | |
oracle | mojarra | 2.1.3 | |
oracle | mojarra | 2.1.4 | |
oracle | mojarra | 2.1.5 | |
oracle | mojarra | 2.1.6 | |
oracle | mojarra | 2.1.7 | |
oracle | mojarra | 2.1.8 | |
oracle | mojarra | 2.1.9 | |
oracle | mojarra | 2.1.10 | |
oracle | mojarra | 2.1.11 | |
oracle | mojarra | 2.1.12 | |
oracle | mojarra | 2.1.13 | |
oracle | mojarra | 2.1.14 | |
oracle | mojarra | 2.1.15 | |
oracle | mojarra | 2.1.16 | |
oracle | mojarra | 2.1.17 | |
oracle | mojarra | 2.1.18 | |
oracle | mojarra | 2.1.19 | |
oracle | mojarra | 2.1.20 | |
oracle | mojarra | 2.1.21 | |
oracle | mojarra | 2.1.22 | |
oracle | mojarra | 2.1.23 | |
oracle | mojarra | 2.1.24 | |
oracle | mojarra | 2.1.25 | |
oracle | mojarra | 2.1.26 | |
oracle | mojarra | 2.1.27 | |
oracle | mojarra | 2.2.0 | |
oracle | mojarra | 2.2.1 | |
oracle | mojarra | 2.2.2 | |
oracle | mojarra | 2.2.3 | |
oracle | mojarra | 2.2.4 | |
oracle | mojarra | 2.2.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D545A6A-CA1E-40F4-AFEF-8A22F1963959", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F9ED4467-18CC-4710-8343-0B5D3F1E0E8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2629C89A-14F7-4642-ABC7-17428751563B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0C44BE8D-C99C-45B7-BE72-5B4587F11DD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "2BE4C509-061C-49FF-99CA-848EF82F0FFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "283ECF0D-ED11-4D5C-8995-E93785CD1886", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "8F8F944C-42A2-4E4D-AB97-3800FE7BA086", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "C4FC9BF2-44D9-4514-950D-84E75E27C9BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "D1ADC8E6-C052-4A4E-B840-4DF68CEFE409", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "D2C62BDE-8BF2-4389-9511-BF8B54BF0E2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "D3AB62D2-3836-43A9-8209-ECC01298DDF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "CCC9D019-DE8F-4431-A79A-AD3507F993AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "6E9DEC24-5347-4A2D-A705-74AEFFF0BB59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "3865ED07-C221-4A83-8048-747A030E163F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "06463192-2C6E-4059-9D56-B3C7D56616A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "19A02DAC-B2D0-4043-A9C5-0297D555B79E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "3308CD3A-7D58-4251-85E4-AE16552CA850", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "6460D8F1-762C-4703-B32F-2D3AF3075609", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F53DF75-0B83-4260-9F1C-9131FDAEC751", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "B2E4A67F-0E82-4C15-8A07-5FA58EA6C43E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "56A24C0C-13B2-4E8F-8677-B43D0E81459F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "656F4F63-5818-45DB-B616-3A82627CBE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "AA2C9A44-4977-4D8F-8713-4B8CD08C9C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "970027E5-EC84-4C9F-BB48-0EEDF9C84A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "B78471D0-5C90-479F-9318-ACF4CC0CF44B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "88338F11-4E7D-451D-A265-0EFED5230CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "A5BC2BE1-4500-4ABA-A9BF-E84D433C9644", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "7DF0069D-EA77-476A-8D74-77D29221391C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D53E07D9-826D-4CCB-BFD0-345F3AB669C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A506B90E-C4BE-4A16-901E-5D21AAE4FFD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "945AF3FF-57F8-434C-8B2C-753E9E791A0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AC60987-2D5B-44A6-BB4B-4E34B095C4C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "FC5653BF-E8E4-4844-BFBD-9275DF072173", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "2CD86AF0-3DA1-4A1C-BFAC-1A0ED1B76CDB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Oracle Mojarra 2.2.x before 2.2.6 and 2.1.x before 2.1.28 does not perform appropriate encoding when a (1) \u003ch:outputText\u003e tag or (2) EL expression is used after a scriptor style block, which allows remote attackers to conduct cross-site scripting (XSS) attacks via application-specific vectors." }, { "lang": "es", "value": "Oracle Mojarra 2.2.x anterior a 2.2.6 y 2.1.x anterior a 2.1.28 no realiza la codificaci\u00f3n debida cuando se utilice (1) una etiqueta o (2) una expresi\u00f3n EL despu\u00e9s de un bloque del estilo scriptor, lo que permite a atacantes remotos realizar ataques de XSS a trav\u00e9s de vectores espec\u00edficos de una aplicaci\u00f3n." } ], "id": "CVE-2013-5855", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-07-17T05:10:13.937", "references": [ { "source": "secalert_us@oracle.com", "url": "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/JSF-outputText-tag-the-good-the-bad-and-the-ugly/ba-p/6368011#.U8ccVPlXZHU" }, { "source": "secalert_us@oracle.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html" }, { "source": "secalert_us@oracle.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-0720.html" }, { "source": "secalert_us@oracle.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-0765.html" }, { "source": "secalert_us@oracle.com", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "source": "secalert_us@oracle.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "source": "secalert_us@oracle.com", "url": "http://www.securityfocus.com/bid/65600" }, { "source": "secalert_us@oracle.com", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "source": "secalert_us@oracle.com", "url": "https://java.net/jira/browse/JAVASERVERFACES-3150" }, { "source": "secalert_us@oracle.com", "url": "https://java.net/jira/browse/JAVASERVERFACES_SPEC_PUBLIC-1258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/JSF-outputText-tag-the-good-the-bad-and-the-ugly/ba-p/6368011#.U8ccVPlXZHU" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-0720.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-0765.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65600" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://java.net/jira/browse/JAVASERVERFACES-3150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://java.net/jira/browse/JAVASERVERFACES_SPEC_PUBLIC-1258" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…