{"id": "CVE-2021-32005", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 3.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 6.8, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Secondary", "source": "VulnerabilityReporting@secomea.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}, "impactScore": 3.7, "exploitabilityScore": 2.3}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 5.4, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 2.3}]}, "published": "2022-03-10T17:42:13.473", "references": [{"url": "https://www.secomea.com/support/cybersecurity-advisory/#5017", "tags": ["Not Applicable", "Vendor Advisory"], "source": "VulnerabilityReporting@secomea.com"}, {"url": "https://www.secomea.com/support/cybersecurity-advisory/#5017", "tags": ["Not Applicable", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "VulnerabilityReporting@secomea.com", "description": [{"lang": "en", "value": "CWE-79"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site Scripting (XSS) vulnerability in log view of Secomea SiteManager allows a logged in user to store javascript for later execution. This issue affects: Secomea SiteManager Version 9.6.621421014 and all prior versions."}, {"lang": "es", "value": "Una vulnerabilidad de tipo cross-site Scripting (XSS) en la visualizaci\u00f3n de registro de Secomea SiteManager permite a un usuario que ha iniciado sesi\u00f3n almacenar javascript para su posterior ejecuci\u00f3n. Este problema afecta a: Secomea SiteManager versi\u00f3n 9.6.621421014 y todas las versiones anteriores"}], "lastModified": "2024-11-21T06:06:41.883", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:secomea:sitemanager_1129_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EE20816-9B69-486D-9D19-29BCE0CC0B2F", "versionEndExcluding": "9.6.621421014"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:secomea:sitemanager_1129:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "29BFC1D6-82B6-4E20-BBFB-63F33373D78B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:secomea:sitemanager_1139_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59C89E1B-1A97-442E-A6B3-B6D0364F5EBA", "versionEndExcluding": "9.6.621421014"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:secomea:sitemanager_1139:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "856E0FE1-D1FD-47A3-8DE0-A12F6FBD60E8"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:secomea:sitemanager_1149_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "234DAB99-26F6-4898-A6F9-F71FE45E8FBF", "versionEndExcluding": "9.6.621421014"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:secomea:sitemanager_1149:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "060DA5EF-B6FE-4E02-B0A5-EAAF5CF5AC35"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:secomea:sitemanager_3329_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "251C5A8B-8FE9-4BF6-82B0-6C59AEC3D197", "versionEndExcluding": "9.6.621421014"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:secomea:sitemanager_3329:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6ABE08F2-C6D0-4CA3-99F4-0654653E7BF3"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:secomea:sitemanager_3339_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9BAA743-817E-4421-9301-ABDF792B3B30", "versionEndExcluding": "9.6.621421014"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:secomea:sitemanager_3339:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FF64F7DA-FD12-4231-B792-EF8F79B587CF"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:secomea:sitemanager_3349_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2926AE67-9BE4-4E74-9136-8322DE8A4D17", "versionEndExcluding": "9.6.621421014"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:secomea:sitemanager_3349:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8C7D7926-A5F5-46A1-A6B7-3C99130FA609"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:secomea:sitemanager_3529_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0991E33A-AD49-454D-9B42-49C5A937FDBA", "versionEndExcluding": "9.6.621421014"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:secomea:sitemanager_3529:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5C5F7D37-729C-4969-9661-C933C9F16980"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:secomea:sitemanager_3539_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "896E0C54-677B-403D-AA59-9E97D2A5F98D", "versionEndExcluding": "9.6.621421014"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:secomea:sitemanager_3539:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1D26BFEA-056C-4760-8D10-A0DF3677DAD1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:secomea:sitemanager_3549_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C4F4541-AC64-45D6-9281-46C5AA9BA5BF", "versionEndExcluding": "9.6.621421014"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:secomea:sitemanager_3549:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A05A3825-9C8E-43EF-A2DC-F0B06694CCCD"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "VulnerabilityReporting@secomea.com"}