ID CVE-2013-7191
Type cve
Reporter cve@mitre.org
Modified 2017-08-29T01:34:00
Description
Cross-site scripting (XSS) vulnerability in Tenmiles Helpdesk Pilot allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI for a ticket.
{"id": "CVE-2013-7191", "bulletinFamily": "NVD", "title": "CVE-2013-7191", "description": "Cross-site scripting (XSS) vulnerability in Tenmiles Helpdesk Pilot allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI for a ticket.", "published": "2013-12-21T00:55:00", "modified": "2017-08-29T01:34:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-7191", "reporter": "cve@mitre.org", "references": ["http://makthepla.net/blog/=/helpdesk-pilot-add-admin", "https://exchange.xforce.ibmcloud.com/vulnerabilities/89510", "http://secunia.com/advisories/55797"], "cvelist": ["CVE-2013-7191"], "type": "cve", "lastseen": "2021-02-02T06:07:01", "edition": 4, "viewCount": 1, "enchantments": {"dependencies": {"references": [], "modified": "2021-02-02T06:07:01", "rev": 2}, "score": {"value": 4.1, "vector": "NONE", "modified": "2021-02-02T06:07:01", "rev": 2}, "vulnersScore": 4.1}, "cpe": ["cpe:/a:tenmiles:helpdesk_pilot:-", "cpe:/a:tenmiles:helpdesk_pilot:5.0"], "affectedSoftware": [{"cpeName": "tenmiles:helpdesk_pilot", "name": "tenmiles helpdesk pilot", "operator": "eq", "version": "-"}, {"cpeName": "tenmiles:helpdesk_pilot", "name": "tenmiles helpdesk pilot", "operator": "eq", "version": "5.0"}], "cvss2": {"cvssV2": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true}, "cvss3": {}, "cpe23": ["cpe:2.3:a:tenmiles:helpdesk_pilot:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:tenmiles:helpdesk_pilot:-:*:*:*:*:*:*:*"], "cwe": ["CWE-79"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:tenmiles:helpdesk_pilot:-:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:tenmiles:helpdesk_pilot:5.0:*:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}]}, "extraReferences": [{"name": "55797", "refsource": "SECUNIA", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/55797"}, {"name": "helpdeskpilot-unspecified-xss(89510)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89510"}, {"name": "http://makthepla.net/blog/=/helpdesk-pilot-add-admin", "refsource": "MISC", "tags": ["Exploit"], "url": "http://makthepla.net/blog/=/helpdesk-pilot-add-admin"}]}
{}