Show plain JSON{"id": "CVE-2016-10569", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.2}]}, "published": "2018-05-31T20:29:02.423", "references": [{"url": "https://nodesecurity.io/advisories/187", "tags": ["Third Party Advisory"], "source": "support@hackerone.com"}, {"url": "https://nodesecurity.io/advisories/187", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "support@hackerone.com", "description": [{"lang": "en", "value": "CWE-311"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-310"}]}], "descriptions": [{"lang": "en", "value": "embedza is a module to create HTML snippets/embeds from URLs using info from oEmbed, Open Graph, meta tags. embedza versions below 1.2.4 download JavaScript resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested JavaScript file with an attacker controlled JavaScript file if the attacker is on the network or positioned in between the user and the remote server."}, {"lang": "es", "value": "embedza es un m\u00f3dulo para crear snippets/embeds HTML de URL que utilizan informaci\u00f3n de metatags oEmbed y Open Graph. embedza en versiones anteriores a la 1.2.4 descarga recursos JavaScript mediante HTTP, volvi\u00e9ndolo vulnerable a ataques Man-in-the-Middle (MitM). Es posible que se ejecute c\u00f3digo de manera remota al cambiar el archivo JavaScript solicitado por un archivo JavaScript controlado por el atacante si el atacante se encuentra en la red o entre el usuario y el servidor remoto."}], "lastModified": "2024-11-21T02:44:17.750", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:embedza_project:embedza:*:*:*:*:*:node.js:*:*", "vulnerable": true, "matchCriteriaId": "E78F9AB8-8004-494E-9D3B-1DE8394D33DE", "versionEndExcluding": "1.2.4"}], "operator": "OR"}]}], "sourceIdentifier": "support@hackerone.com"}