Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:apache:jspwiki:*:*:*:*:*:*:*:*", "matchCriteriaId": "9490098B-32BC-4DE1-A91C-0DB1781B6551", "versionEndIncluding": "2.10.5", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:jspwiki:2.11.0:m1:*:*:*:*:*:*", "matchCriteriaId": "695F7479-0378-43BA-B4EF-2720D9D603B2", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:jspwiki:2.11.0:m1-rc1:*:*:*:*:*:*", "matchCriteriaId": "FED3FE19-F79F-4935-A399-D02502257719", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:jspwiki:2.11.0:m1-rc2:*:*:*:*:*:*", "matchCriteriaId": "C4F7A3FC-749D-4074-B8C5-B2E413E059E5", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:jspwiki:2.11.0:m1-rc3:*:*:*:*:*:*", "matchCriteriaId": "17D5A1A7-4D6D-44E6-9EE8-93F306300346", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:jspwiki:2.11.0:m2:*:*:*:*:*:*", "matchCriteriaId": "544E5477-CADE-4E6A-B0AF-E178CE98CD39", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:jspwiki:2.11.0:m2-rc1:*:*:*:*:*:*", "matchCriteriaId": "1518742F-4C6F-488F-8510-6D5774F46D6F", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:jspwiki:2.11.0:m3:*:*:*:*:*:*", "matchCriteriaId": "E857BCCA-1DF1-4E97-939A-72F58CAF7682", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:jspwiki:2.11.0:m3-rc1:*:*:*:*:*:*", "matchCriteriaId": "6A59A703-D91D-4841-AF98-CF64ED0657D9", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:jspwiki:2.11.0:m3-rc2:*:*:*:*:*:*", "matchCriteriaId": "62E87475-188A-4793-8FE2-99E8F407ABB0", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:jspwiki:2.11.0:m4:*:*:*:*:*:*", "matchCriteriaId": "FAD5C4C6-B329-4763-9F8D-3DEECEAF6258", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:jspwiki:2.11.0:m4-rc1:*:*:*:*:*:*", "matchCriteriaId": "8C294E89-885D-4963-B00C-BA8F03AB99FA", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:jspwiki:2.11.0:m4-rc2:*:*:*:*:*:*", "matchCriteriaId": "615D6BA8-2E24-4A27-AD40-DEA5CBD47D76", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim."}, {"lang": "es", "value": "En Apache JSPWiki, hasta la versi\u00f3n 2.11.0.M4, una invocaci\u00f3n de enlace de plugin cuidadosamente dise\u00f1ada podr\u00eda desencadenar una vulnerabilidad de tipo XSS en Apache JSPWiki, relacionada con el editor WYSIWYG, lo que podr\u00eda permitir al atacante ejecutar javascript en el navegador de la v\u00edctima y obtener alguna informaci\u00f3n confidencial sobre la v\u00edctima."}], "id": "CVE-2019-10089", "lastModified": "2024-11-21T04:18:22.870", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-09-23T15:15:10.420", "references": [{"source": "security@apache.org", "tags": ["Vendor Advisory"], "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10089"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10089"}], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}