CVE-2011-4924
Cross-site scripting (XSS) vulnerability in Zope 2.8.x before 2.8.12, 2.9.x before 2.9.12, 2.10.x before 2.10.11, 2.11.x before 2.11.6, and 2.12.x before 2.12.3, 3.1.1 through 3.4.1. allows remote attackers to inject arbitrary web script or HTML via vectors related to the way error messages perform sanitization. NOTE: this issue exists because of an incomplete fix for CVE-2010-1104
Published
2019-11-25T18:15:11.440
Last Modified
2024-11-21T01:33:18.557
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 6.1 (MEDIUM)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:N/I:P/A:N
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: PARTIAL
- Availability Impact: NONE
Exploitability Score
8.6
Impact Score
2.9
Weaknesses
Affected Vendors & Products
Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
Application |
zope
|
zope
|
< 2.8.12 |
Yes
|
Application |
zope
|
zope
|
< 2.9.12 |
Yes
|
Application |
zope
|
zope
|
< 2.10.11 |
Yes
|
Application |
zope
|
zope
|
< 2.11.6 |
Yes
|
Application |
zope
|
zope
|
< 2.12.3 |
Yes
|
Application |
zope
|
zope
|
≤ 3.4.1 |
Yes
|
References
-
http://www.openwall.com/lists/oss-security/2012/01/19/16
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2012/01/19/17
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2012/01/19/18
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2012/01/19/19
Mailing List, Third Party Advisory
([email protected])
-
https://access.redhat.com/security/cve/cve-2011-4924
Third Party Advisory
([email protected])
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4924
Issue Tracking, Third Party Advisory
([email protected])
-
https://security-tracker.debian.org/tracker/CVE-2011-4924
Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2012/01/19/16
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2012/01/19/17
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2012/01/19/18
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2012/01/19/19
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/security/cve/cve-2011-4924
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4924
Issue Tracking, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security-tracker.debian.org/tracker/CVE-2011-4924
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)