CVE-2010-0327

Current Description

Cross-site scripting (XSS) vulnerability in the KJ: Imagelightbox (kj_imagelightbox2) extension 2.0.0 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2008-2490.

Basic Data

PublishedJanuary 15, 2010
Last ModifiedJanuary 18, 2010
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-79
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score4.3
SeverityMEDIUM
Exploitability Score8.6
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • AND
    • OR - Configuration 1
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3ApplicationJulian KleinhansKj Imagelightbox21.4.0*******
      2.3ApplicationJulian KleinhansKj Imagelightbox21.4.1*******
      2.3ApplicationJulian KleinhansKj Imagelightbox21.4.2*******
      2.3ApplicationJulian KleinhansKj Imagelightbox2********2.0.0
    • OR Running on/with:
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3ApplicationTypo3Typo3********

Vulnerable Software List

VendorProductVersions
Julian Kleinhans Kj Imagelightbox2 *, 1.4.0, 1.4.1, 1.4.2

References

NameSourceURLTags
38165http://secunia.com/advisories/38165SECUNIAVendor Advisory
http://typo3.org/extensions/repository/view/kj_imagelightbox2/2.0.2/http://typo3.org/extensions/repository/view/kj_imagelightbox2/2.0.2/CONFIRMPatch
http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-021/http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-021/CONFIRMPatch Vendor Advisory