fkie_cve-2013-5855
Vulnerability from fkie_nvd
Published
2014-07-17 05:10
Modified
2025-04-12 10:46
Severity ?
Summary
Oracle Mojarra 2.2.x before 2.2.6 and 2.1.x before 2.1.28 does not perform appropriate encoding when a (1) <h:outputText> tag or (2) EL expression is used after a scriptor style block, which allows remote attackers to conduct cross-site scripting (XSS) attacks via application-specific vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| oracle | mojarra | 2.1.0 | |
| oracle | mojarra | 2.1.1 | |
| oracle | mojarra | 2.1.2 | |
| oracle | mojarra | 2.1.3 | |
| oracle | mojarra | 2.1.4 | |
| oracle | mojarra | 2.1.5 | |
| oracle | mojarra | 2.1.6 | |
| oracle | mojarra | 2.1.7 | |
| oracle | mojarra | 2.1.8 | |
| oracle | mojarra | 2.1.9 | |
| oracle | mojarra | 2.1.10 | |
| oracle | mojarra | 2.1.11 | |
| oracle | mojarra | 2.1.12 | |
| oracle | mojarra | 2.1.13 | |
| oracle | mojarra | 2.1.14 | |
| oracle | mojarra | 2.1.15 | |
| oracle | mojarra | 2.1.16 | |
| oracle | mojarra | 2.1.17 | |
| oracle | mojarra | 2.1.18 | |
| oracle | mojarra | 2.1.19 | |
| oracle | mojarra | 2.1.20 | |
| oracle | mojarra | 2.1.21 | |
| oracle | mojarra | 2.1.22 | |
| oracle | mojarra | 2.1.23 | |
| oracle | mojarra | 2.1.24 | |
| oracle | mojarra | 2.1.25 | |
| oracle | mojarra | 2.1.26 | |
| oracle | mojarra | 2.1.27 | |
| oracle | mojarra | 2.2.0 | |
| oracle | mojarra | 2.2.1 | |
| oracle | mojarra | 2.2.2 | |
| oracle | mojarra | 2.2.3 | |
| oracle | mojarra | 2.2.4 | |
| oracle | mojarra | 2.2.5 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8D545A6A-CA1E-40F4-AFEF-8A22F1963959",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F9ED4467-18CC-4710-8343-0B5D3F1E0E8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2629C89A-14F7-4642-ABC7-17428751563B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0C44BE8D-C99C-45B7-BE72-5B4587F11DD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE4C509-061C-49FF-99CA-848EF82F0FFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "283ECF0D-ED11-4D5C-8995-E93785CD1886",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8F8F944C-42A2-4E4D-AB97-3800FE7BA086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C4FC9BF2-44D9-4514-950D-84E75E27C9BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D1ADC8E6-C052-4A4E-B840-4DF68CEFE409",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D2C62BDE-8BF2-4389-9511-BF8B54BF0E2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "D3AB62D2-3836-43A9-8209-ECC01298DDF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC9D019-DE8F-4431-A79A-AD3507F993AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6E9DEC24-5347-4A2D-A705-74AEFFF0BB59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3865ED07-C221-4A83-8048-747A030E163F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "06463192-2C6E-4059-9D56-B3C7D56616A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "19A02DAC-B2D0-4043-A9C5-0297D555B79E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "3308CD3A-7D58-4251-85E4-AE16552CA850",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "6460D8F1-762C-4703-B32F-2D3AF3075609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "8F53DF75-0B83-4260-9F1C-9131FDAEC751",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "B2E4A67F-0E82-4C15-8A07-5FA58EA6C43E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "56A24C0C-13B2-4E8F-8677-B43D0E81459F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "656F4F63-5818-45DB-B616-3A82627CBE0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "AA2C9A44-4977-4D8F-8713-4B8CD08C9C0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "970027E5-EC84-4C9F-BB48-0EEDF9C84A1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "B78471D0-5C90-479F-9318-ACF4CC0CF44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "88338F11-4E7D-451D-A265-0EFED5230CCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "A5BC2BE1-4500-4ABA-A9BF-E84D433C9644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.1.27:*:*:*:*:*:*:*",
"matchCriteriaId": "7DF0069D-EA77-476A-8D74-77D29221391C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D53E07D9-826D-4CCB-BFD0-345F3AB669C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A506B90E-C4BE-4A16-901E-5D21AAE4FFD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "945AF3FF-57F8-434C-8B2C-753E9E791A0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9AC60987-2D5B-44A6-BB4B-4E34B095C4C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FC5653BF-E8E4-4844-BFBD-9275DF072173",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mojarra:2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD86AF0-3DA1-4A1C-BFAC-1A0ED1B76CDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Oracle Mojarra 2.2.x before 2.2.6 and 2.1.x before 2.1.28 does not perform appropriate encoding when a (1) \u003ch:outputText\u003e tag or (2) EL expression is used after a scriptor style block, which allows remote attackers to conduct cross-site scripting (XSS) attacks via application-specific vectors."
},
{
"lang": "es",
"value": "Oracle Mojarra 2.2.x anterior a 2.2.6 y 2.1.x anterior a 2.1.28 no realiza la codificaci\u00f3n debida cuando se utilice (1) una etiqueta o (2) una expresi\u00f3n EL despu\u00e9s de un bloque del estilo scriptor, lo que permite a atacantes remotos realizar ataques de XSS a trav\u00e9s de vectores espec\u00edficos de una aplicaci\u00f3n."
}
],
"id": "CVE-2013-5855",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2014-07-17T05:10:13.937",
"references": [
{
"source": "secalert_us@oracle.com",
"url": "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/JSF-outputText-tag-the-good-the-bad-and-the-ugly/ba-p/6368011#.U8ccVPlXZHU"
},
{
"source": "secalert_us@oracle.com",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html"
},
{
"source": "secalert_us@oracle.com",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0720.html"
},
{
"source": "secalert_us@oracle.com",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0765.html"
},
{
"source": "secalert_us@oracle.com",
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.securityfocus.com/bid/65600"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
},
{
"source": "secalert_us@oracle.com",
"url": "https://java.net/jira/browse/JAVASERVERFACES-3150"
},
{
"source": "secalert_us@oracle.com",
"url": "https://java.net/jira/browse/JAVASERVERFACES_SPEC_PUBLIC-1258"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/JSF-outputText-tag-the-good-the-bad-and-the-ugly/ba-p/6368011#.U8ccVPlXZHU"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0720.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0765.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/65600"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://java.net/jira/browse/JAVASERVERFACES-3150"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://java.net/jira/browse/JAVASERVERFACES_SPEC_PUBLIC-1258"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…