CVE-2013-2136
Published Aug 19, 2013
Last updated 7 years ago
Overview
- Description
- Multiple cross-site scripting (XSS) vulnerabilities in Apache CloudStack before 4.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) Physical network name to the Zone wizard; (2) New network name, (3) instance name, or (4) group to the Instance wizard; (5) unspecified "multi-edit fields;" and (6) unspecified "list view" edit fields related to global settings.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "905B72D5-B6A2-4A63-80F1-F7411706B75C", "versionEndIncluding": "4.1.0" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.0:-:community:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07DDD585-19E2-473A-B1A8-25BB3129D0C0" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D0AA4AC-3101-4012-AA43-7583CB077C59" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E4E5F52-CBCF-47AC-A94A-980EF65841CC" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14E0EF07-41E0-40E7-A0B4-210294118B5E" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4CF7900-A67B-4779-9F04-9C35B1460D89" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "355A13B2-73AB-4AA2-9EE7-AD588D5EE68F" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC0583FF-C928-440E-894C-CB3EC2327444" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "170F57A6-1FCE-439D-AED9-D60BCD9006EC" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD2B711E-E37E-4D76-96E2-B2575B9B165E" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2AC25A79-5B91-4BAC-A419-B1C7F20133FC" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00E46243-C2DF-4448-B559-7AB4B8043CD9" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08F17588-845E-4C52-AB03-E939C7CCEDE0" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7F77294-6AD9-4BEF-9B84-84067A8F4925" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C067A21-0F97-4FB1-9D5B-65DADD589E56" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B321CA2-39D8-4DC6-843F-38BE3DBAE795" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0601E746-2144-4AEC-A2A3-F35A67EC7AD1" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F738C7C1-84B7-4E16-8F1A-4ACF3FE90A12" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BA7376F-6160-4DDB-B0C3-D68719519256" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3FBF487-4528-4453-82D8-B10388FB6487" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EFDB749-57D9-4C81-A0BC-751F97183F61" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7882F0F9-EF9E-48BB-B609-2D3BAC089A92" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E3D50D8C-1739-4A08-891B-752F5048E1B6" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E4F87FA-CE60-4BBE-AB61-4CDB76DE6C65" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.2.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E640A1C1-4B65-4978-B4CA-A1049B5C9443" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.2.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C539879-5EC9-4BA7-9FE1-B93933D77FA8" }, { "criteria": "cpe:2.3:a:apache:cloudstack:2.2.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "836EF10E-6F1D-4E7A-B41C-34C5CD246C17" }, { "criteria": "cpe:2.3:a:apache:cloudstack:3.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C09B6538-02FB-4AC8-9F1B-AAAE7A9BE6C0" }, { "criteria": "cpe:2.3:a:apache:cloudstack:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "518BB162-8FAD-4B73-87B0-604EA84B3DB5" }, { "criteria": "cpe:2.3:a:apache:cloudstack:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C68CF8F3-D31B-4CDB-91C9-0334012C7CE6" }, { "criteria": "cpe:2.3:a:apache:cloudstack:4.0.0:incubating:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA46B1B9-FCD7-4F3D-88E6-95B1A5A0497C" }, { "criteria": "cpe:2.3:a:apache:cloudstack:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C96C7798-F716-44DA-A57F-3103E001236B" }, { "criteria": "cpe:2.3:a:apache:cloudstack:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "737C672C-D820-41B9-88E3-97DC113D9290" } ], "operator": "OR" } ] } ]