fkie_cve-2010-1453
Vulnerability from fkie_nvd
Published
2010-05-07 18:24
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Login form in Piwik 0.1.6 through 0.5.5 allows remote attackers to inject arbitrary web script or HTML via the form_url parameter.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:matomo:matomo:0.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "575F3475-319E-47E5-8B24-B8CF8FF1999B", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "14E9E4A9-484C-4778-A9A6-8985F50C86E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "5C1C34AD-ED5C-4F4E-B987-052A7BDD96D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "683763A0-50EA-4B60-A356-D1215153FBD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B08D1E94-8CA5-4CFF-A851-BDEEB14FE2C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "23405228-A62F-4247-9F62-8F41DF12CC79", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "0DF19F16-95A2-4CB7-8049-8327E80A52E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "BB28EFFC-891D-44CA-A8A8-B10A95206A75", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "1372728F-8DDF-476C-8F6E-EFCF49C35EEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "CF5B71E1-CE28-42D5-BF82-1C0A14C51233", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A226F1B7-2050-4102-8546-1C4B38FDAC7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "D1F56B7D-C131-418C-ABD6-DDCA105E8E0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "B201D593-5696-47E3-8FA5-97DAECEE405F", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "6C1F7635-DFD1-4847-937F-6020CDE1BC7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "2062372A-C061-435F-A563-FA717A562793", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "7E605BE7-8750-450E-871F-5CDE57D2528C", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "7A613D1F-FA93-4459-B49B-5A96CF64F772", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF1D373B-4001-46FA-A99D-44E69E4D7D33", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "E74FA628-CBA0-4E9E-BA53-0035C6BE877E", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "665BF716-5845-4CD8-B33B-FAC8C29D2E82", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "833F0705-FB08-416E-920C-DF6324E88775", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "925FC533-97C4-4D74-8841-1D92E32D52DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "611713A4-00A0-48FA-8845-716053BBB084", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "424082B7-1182-4419-A8AA-CFD7A38CAF84", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "64D44CAA-4779-4B17-B03D-5ECB146A613A", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "C790AE91-82E3-476E-ADEF-A1B6178AC817", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "FC388DDD-1C79-4B89-A75A-7BF06893276F", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "262A0DB0-6CE4-41E7-BDC6-18924C76EDCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "D3F37F31-2288-4B86-9EEB-38EE8B1979C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "74DBC09F-4B09-490B-8367-93B3257F9DBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "0384553E-FEEB-4AE4-B1F1-1EC99BE07BD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "E64C21FE-BCA5-4830-AA85-5959CBE3800D", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "BF976D83-866E-416D-A21C-2BF2A8F95462", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "1E9EB7C0-C645-4E1A-A7CD-87325BBA81E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "998651DF-2552-4A8E-9EA9-AEEED3D39BCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.33:*:*:*:*:*:*:*", "matchCriteriaId": "1C0BC4C8-ECBE-488B-ABE8-5A080FBF5AC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.2.34:*:*:*:*:*:*:*", "matchCriteriaId": "288685F8-8F1D-4019-B5D1-AADF38622ABD", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "90ED76A7-37BB-4438-83E8-86A826B6CA53", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "392788F8-7ECC-4BCD-B415-B14C8B57E117", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "340C02F9-D975-4954-B952-D4F970483F82", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.4.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "5AE2C007-7B53-40CE-9ABA-E2F56A2329C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "C26D8F47-9BDD-4A57-815D-409BFAF2CE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "5CB9824A-589E-436C-BD11-C5936B492BAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2C95F489-6E9F-4F5E-A79B-473D3E2D6FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B28488E4-C6CD-41C1-BEE0-85D495E5ED5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D034FA2E-3DAF-44C7-8405-EC39DDDE1DF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "6E02CFA8-FDDC-47A7-BD98-4AF242655D87", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "8F15AEAB-C240-4348-B6A9-597E338D4968", "vulnerable": true }, { "criteria": "cpe:2.3:a:matomo:matomo:0.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "D45F0B05-26A5-492D-972C-0AA7487B5355", "vulnerable": true }, { "criteria": "cpe:2.3:a:piwik:piwik:0.5.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FB705E0-7652-4F50-B699-E775ABF02F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:piwik:piwik:0.5.5:rc2:*:*:*:*:*:*", "matchCriteriaId": "5C87D0C5-900B-468F-8C05-46F6AE4076E1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Login form in Piwik 0.1.6 through 0.5.5 allows remote attackers to inject arbitrary web script or HTML via the form_url parameter." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en el formulario de login en Piwik v0.1.6 hasta v0.5.5 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro \"form_url\"." } ], "id": "CVE-2010-1453", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-07T18:24:15.907", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://piwik.org/blog/2010/04/piwik-0-6-security-advisory/" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39666" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/05/05/3" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/05/05/4" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://piwik.org/blog/2010/04/piwik-0-6-security-advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39666" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/05/05/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/05/05/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1079" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…