Show plain JSON{"id": "CVE-2012-0283", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2012-07-13T21:55:02.297", "references": [{"url": "http://bugs.dokuwiki.org/index.php?do=details&task_id=2561", "tags": ["Vendor Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090755.html", "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090899.html", "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090938.html", "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "http://secunia.com/secunia_research/2012-24/", "tags": ["Vendor Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "http://security.gentoo.org/glsa/glsa-201301-07.xml", "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "http://www.securityfocus.com/bid/54439", "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "http://bugs.dokuwiki.org/index.php?do=details&task_id=2561", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090755.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090899.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090938.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/secunia_research/2012-24/", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://security.gentoo.org/glsa/glsa-201301-07.xml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/54439", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the tpl_mediaFileList function in inc/template.php in DokuWiki before 2012-01-25b allows remote attackers to inject arbitrary web script or HTML via the ns parameter in a medialist action to lib/exe/ajax.php."}, {"lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en la funci\u00f3n tpl_mediaFileList en inc/template.php en DokuWiki anterior a 2012-01-25b, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro ns en una acci\u00f3n medialist para lib/exe/ajax.php."}], "lastModified": "2024-11-21T01:34:43.040", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12B16E9B-CC3A-4300-B353-363A8B7EB446", "versionEndIncluding": "2012-01-25a"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2005-07-01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D021EAF4-D850-460C-ABD9-24384F272202"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2005-09-19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D500736-2E65-4942-BB14-87E8400DF432"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2005-09-22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE9F3578-5DD7-4C23-A05E-1B69A3DE1131"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2006-03-05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04F84AF0-7A64-4044-84A5-93A04292B49F"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2006-03-09:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "721A76A3-A352-4BFE-988A-8E7493801821"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2006-11-06:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25638BDF-056E-40FD-AF69-75E7D6A0AFEB"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2007-06-26:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79D062E1-A814-47CF-A5B8-1F1126903538"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2007-07-13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F31C0B00-5A0F-4FB7-8410-5946F5F90159"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2008-05-05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DD798EB-EFA7-4E29-AB93-E4DED45BA639"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2009-02-14b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D6DCFD7-4768-4EFF-A58F-05B3A21ABEB7"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2009-12-25c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17804D28-62D1-4DF5-BF32-C4C7FAE76094"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2010-11-07a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDFB8409-5B32-4511-A26B-95D5F6159564"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2011-05-25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F4F37E4-BF85-4385-A71C-D9B1ACDE1906"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2011-05-25a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C568179A-1008-4428-8F7B-0FF40D2627EB"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2011-05-25c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBACBE66-DDDF-4783-8E9F-CA488E79326E"}, {"criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2012-01-25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "266A9481-905C-4F8B-943B-73F023EC851A"}], "operator": "OR"}]}], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com"}