fkie_cve-2016-9757
Vulnerability from fkie_nvd
Published
2016-12-20 22:59
Modified
2025-04-12 10:46
Severity ?
Summary
In the Create Tags page of the Rapid7 Nexpose version 6.4.12 user interface, any authenticated user who has the capability to create tags can inject cross-site scripting (XSS) elements in the tag name field. Once this tag is viewed in the Tag Detail page of the Rapid7 Nexpose 6.4.12 UI by another authenticated user, the script is run in that user's browser context.
References
▶ | URL | Tags | |
---|---|---|---|
cve@rapid7.com | http://www.securityfocus.com/bid/94996 | Third Party Advisory, VDB Entry | |
cve@rapid7.com | https://help.rapid7.com/nexpose/en-us/release-notes/#6.4.13 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/94996 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://help.rapid7.com/nexpose/en-us/release-notes/#6.4.13 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rapid7:nexpose:6.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "957301F3-95BF-415A-A318-67C94C4D12AF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Create Tags page of the Rapid7 Nexpose version 6.4.12 user interface, any authenticated user who has the capability to create tags can inject cross-site scripting (XSS) elements in the tag name field. Once this tag is viewed in the Tag Detail page of the Rapid7 Nexpose 6.4.12 UI by another authenticated user, the script is run in that user\u0027s browser context." }, { "lang": "es", "value": "En la p\u00e1gina Create Tags de la interfaz de usuario de Rapid7 Nexpose versi\u00f3n 6.4.12, cualquier usuario autenticado que tiene la capacidad de crear etiquetas puede inyectar elementos CSS en la etiqueta de campo de nombre. Por ejemplo, una etiqueta de nombre como \"AB\" es suficiente para explotar la vulnerabilidad. Una vez esta etiqueta se ve en la p\u00e1gina Tag Detail de la interfaz de usuario de Rapid7 Nexpose 6.4.12 por otro usuario autenticado, la secuencia se ejecuta en ese contexto del navegador del usuario." } ], "id": "CVE-2016-9757", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-12-20T22:59:00.350", "references": [ { "source": "cve@rapid7.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94996" }, { "source": "cve@rapid7.com", "tags": [ "Vendor Advisory" ], "url": "https://help.rapid7.com/nexpose/en-us/release-notes/#6.4.13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://help.rapid7.com/nexpose/en-us/release-notes/#6.4.13" } ], "sourceIdentifier": "cve@rapid7.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…