Lucene search

K
cvelistVulDBCVELIST:CVE-2014-125027
HistoryDec 31, 2022 - 3:12 p.m.

CVE-2014-125027 Yuna Scatari TBDev usersearch.php get_user_icons cross site scripting

2022-12-3115:12:48
CWE-79
VulDB
www.cve.org
2
yuna scatari
tbdev
cross site scripting

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

CVSS3

3.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

37.1%

A vulnerability has been found in Yuna Scatari TBDev up to 2.1.17 and classified as problematic. Affected by this vulnerability is the function get_user_icons of the file usersearch.php. The manipulation of the argument n/r/r2/em/ip/co/ma/d/d2/ul/ul2/ls/ls2/dl/dl2 leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.1.18 is able to address this issue. The patch is named 0ba3fd4be29dd48fa4455c236a9403b3149a4fd4. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217147.

CNA Affected

[
  {
    "vendor": "Yuna Scatari",
    "product": "TBDev",
    "versions": [
      {
        "version": "2.1.0",
        "status": "affected"
      },
      {
        "version": "2.1.1",
        "status": "affected"
      },
      {
        "version": "2.1.2",
        "status": "affected"
      },
      {
        "version": "2.1.3",
        "status": "affected"
      },
      {
        "version": "2.1.4",
        "status": "affected"
      },
      {
        "version": "2.1.5",
        "status": "affected"
      },
      {
        "version": "2.1.6",
        "status": "affected"
      },
      {
        "version": "2.1.7",
        "status": "affected"
      },
      {
        "version": "2.1.8",
        "status": "affected"
      },
      {
        "version": "2.1.9",
        "status": "affected"
      },
      {
        "version": "2.1.10",
        "status": "affected"
      },
      {
        "version": "2.1.11",
        "status": "affected"
      },
      {
        "version": "2.1.12",
        "status": "affected"
      },
      {
        "version": "2.1.13",
        "status": "affected"
      },
      {
        "version": "2.1.14",
        "status": "affected"
      },
      {
        "version": "2.1.15",
        "status": "affected"
      },
      {
        "version": "2.1.16",
        "status": "affected"
      },
      {
        "version": "2.1.17",
        "status": "affected"
      }
    ]
  }
]

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

CVSS3

3.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

37.1%

Related for CVELIST:CVE-2014-125027