CVE-2013-5108
Published Dec 5, 2013
Last updated 7 years ago
Overview
- Description
- Multiple cross-site scripting (XSS) vulnerabilities in the xn function in RockMongo 1.1.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) db parameter on the login page or (2) username parameter in a login.index action to index.php and other unspecified parameters.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:rockmongo:rockmongo:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F07E63CA-DC1E-4C04-8894-38285D9FA3C6", "versionEndIncluding": "1.1.5" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60343CDA-3F7C-45F7-87BE-598596D687F7" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "098AE33E-6063-408F-B5E1-13A50596B941" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B50E327E-8247-4148-83EB-D7ABA22F8988" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D574D727-4C70-49A9-BBF3-A401B8FD11D8" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B517EAA8-5AA6-4CBE-AEA8-8E166A3B8399" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BBC287E-D5EF-4262-A51C-5AD3D7449EB6" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B7C3ABC-7BAD-464C-AD4F-B561882ABC4B" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D54D8D4D-E3BC-4361-A562-C5E10686F1FE" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97CAD3ED-BC22-4BF4-A8E2-E28E9A9D0C51" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70AA3C05-4D64-4024-BD13-078750EA7465" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9384F995-44B7-4DF5-BA94-CA868AE8E82F" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A655F81A-ED7E-4B8A-8818-D5E20182CAB7" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC82766A-FC33-4147-8F2D-B4882F79F02D" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2506C1E-853E-4C65-9066-94208D1C0E3A" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "115A04F6-57DC-4C94-9935-518700AA5143" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2E74AE8-CEEB-46E3-935D-CDEED7844249" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB3867A1-256A-4EFE-9864-A41B4CEF3F03" } ], "operator": "OR" } ] } ]