CVE-2014-0014 (GCVE-0-2014-0014)
Vulnerability from cvelistv5
Published
2018-02-15 21:00
Modified
2024-08-06 08:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Ember.js 1.0.x before 1.0.1, 1.1.x before 1.1.3, 1.2.x before 1.2.1, 1.3.x before 1.3.1, and 1.4.x before 1.4.0-beta.2 allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging an application using the "{{group}}" Helper and a crafted payload.
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T08:58:26.614Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://groups.google.com/forum/#%21topic/ember-security/PSE4RzTi6l4"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://emberjs.com/blog/2014/01/14/ember-security-releases.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-01-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Ember.js 1.0.x before 1.0.1, 1.1.x before 1.1.3, 1.2.x before 1.2.1, 1.3.x before 1.3.1, and 1.4.x before 1.4.0-beta.2 allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging an application using the \"{{group}}\" Helper and a crafted payload."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T00:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://groups.google.com/forum/#%21topic/ember-security/PSE4RzTi6l4"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://emberjs.com/blog/2014/01/14/ember-security-releases.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0014",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Ember.js 1.0.x before 1.0.1, 1.1.x before 1.1.3, 1.2.x before 1.2.1, 1.3.x before 1.3.1, and 1.4.x before 1.4.0-beta.2 allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging an application using the \"{{group}}\" Helper and a crafted payload."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4",
"refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4"
},
{
"name": "http://emberjs.com/blog/2014/01/14/ember-security-releases.html",
"refsource": "CONFIRM",
"url": "http://emberjs.com/blog/2014/01/14/ember-security-releases.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2014-0014",
"datePublished": "2018-02-15T21:00:00",
"dateReserved": "2013-12-03T00:00:00",
"dateUpdated": "2024-08-06T08:58:26.614Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2014-0014\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-02-15T21:29:00.510\",\"lastModified\":\"2024-11-21T02:01:10.570\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Ember.js 1.0.x before 1.0.1, 1.1.x before 1.1.3, 1.2.x before 1.2.1, 1.3.x before 1.3.1, and 1.4.x before 1.4.0-beta.2 allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging an application using the \\\"{{group}}\\\" Helper and a crafted payload.\"},{\"lang\":\"es\",\"value\":\"Ember.js en versiones 1.0.x anteriores a la 1.0.1, 1.1.x anteriores a la 1.1.3, 1.2.x en versiones anteriores a la 1.2.1, 1.3.x anteriores a la 1.3.1 y versiones 1.4.x anteriores a la 1.4.0-beta.2 permite que atacantes remotos lleven a cabo ataques de Cross-Site Scripting (XSS) aprovechando una aplicaci\u00f3n que emplea el Helper \\\"{{group}}\\\" y una carga \u00fatil manipulada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:P/A:N\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06EA010B-7952-455B-8B54-9E1A5E740F31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:pre.2:*:*:*:*:*:*\",\"matchCriteriaId\":\"49EE1E69-375C-49A3-9282-39D614D4F195\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:pre.3:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA3EA4F8-9FA1-4EB6-B417-A000F406D17A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:pre.4:*:*:*:*:*:*\",\"matchCriteriaId\":\"966B3314-F6A5-4BF7-9E6D-27BA19BDB2BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:rc.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9058750-A59E-4AAD-B2B8-4ADC879015E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:rc.1.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7EA109D-CEFC-4F17-AB87-9B4DA2982E37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:rc.2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E3E72B7-9B0D-4DB0-A95D-76DC09675080\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:rc.2.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9143430D-E09D-4E11-82DD-437B5CBCCFB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:rc.3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E4370BF-E322-4039-8D72-0374889B36B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:rc.3.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"76D71469-94FE-46D5-95C4-8BFC110FB0F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:rc.4:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BF3E9CD-4059-4A65-9742-957D536C591E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:rc.4.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"40411326-06E3-4C75-B708-16F003543129\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:rc.5:*:*:*:*:*:*\",\"matchCriteriaId\":\"30855E4E-E81C-4F59-BD74-BF1D9B6E2566\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:rc.5.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C4347F-8032-406C-9649-C28D7136A034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:rc.6:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F89F6D3-A9BD-4AAE-9D63-AE112F5009C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:rc.6.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"04337BE9-46DE-45DA-A8CB-62347ECB7A24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:rc.7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8F08121-EB24-4E05-9619-91E05063A1DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:rc.8:*:*:*:*:*:*\",\"matchCriteriaId\":\"9191FB3E-9216-4FD6-8083-1F7A7B77CC94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.0.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"51AEB9F0-5AC6-4420-BBEE-ECD30A3A1147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"187D45D7-DB71-4AB4-8774-E8FE3685CEFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.1.0:beta.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E16B2354-F3F6-41D9-9F0B-393AF1EFCF95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.1.0:beta.2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFF4CB53-EA5F-4287-A11B-FAD2C64FEF0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.1.0:beta.3:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDAFCA5B-E843-4C92-B521-4154BA352273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.1.0:beta.4:*:*:*:*:*:*\",\"matchCriteriaId\":\"01DF971B-6A44-4784-92E5-27F6C185AE2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CEEE7EE-71A5-4AA0-A45B-33D198A824CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C1B822D-17A7-41C0-83A7-D2DB1CFC0B78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBC412A0-698F-4D20-96D3-52877A8C9869\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.2.0:beta.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"14527BA9-4E61-40DD-84D2-CD8E153AFD44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.2.0:beta.2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBABF9BC-DE98-4153-9DC8-B5CCF35E98DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.2.0:beta.3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5C0C6AA-CF73-4F0F-BADF-3E1C3594D296\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.2.0:beta.4:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED84DC9-6D6B-45A6-9D8A-7E10D9496BEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"592FFC69-C059-45EF-B400-CDA60FC3D792\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.3.0:beta.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1960699D-01A0-44E7-9DA4-5F4C59D01A6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.3.0:beta.2:*:*:*:*:*:*\",\"matchCriteriaId\":\"13D42307-9855-427D-89EF-B56C9D641A65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.3.0:beta.3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C186D57D-CDB1-4567-8CD9-1B7FEC5A479D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.3.0:beta.4:*:*:*:*:*:*\",\"matchCriteriaId\":\"64B67E02-CA41-477B-8F22-4D0ACAF1085E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71844C82-A8B0-45F5-99E9-96400A4A9E9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emberjs:ember.js:1.4.0:beta.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4104EA1F-D2EF-43C4-B3B8-2126ADD9BACF\"}]}]}],\"references\":[{\"url\":\"http://emberjs.com/blog/2014/01/14/ember-security-releases.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://groups.google.com/forum/#%21topic/ember-security/PSE4RzTi6l4\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://emberjs.com/blog/2014/01/14/ember-security-releases.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://groups.google.com/forum/#%21topic/ember-security/PSE4RzTi6l4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…