{"containers":{"cna":{"affected":[{"product":"CMS","vendor":"Elefant","versions":[{"status":"affected","version":"1.3.12-RC"}]}],"credits":[{"lang":"en","value":"Tim Coen"}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in Elefant CMS 1.3.12-RC. Affected is an unknown function. The manipulation of the argument username leads to basic cross site scripting (Persistent). It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-80","description":"CWE-80 Basic Cross Site Scripting","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-06-20T04:50:25.000Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"tags":["x_refsource_MISC"],"url":"http://seclists.org/fulldisclosure/2017/Feb/36"},{"tags":["x_refsource_MISC"],"url":"https://vuldb.com/?id.97254"}],"title":"Elefant CMS Persistent cross site scriting","x_generator":"vuldb.com","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@vuldb.com","ID":"CVE-2017-20057","REQUESTER":"cna@vuldb.com","STATE":"PUBLIC","TITLE":"Elefant CMS Persistent cross site scriting"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"CMS","version":{"version_data":[{"version_value":"1.3.12-RC"}]}}]},"vendor_name":"Elefant"}]}},"credit":"Tim Coen","data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability classified as problematic has been found in Elefant CMS 1.3.12-RC. Affected is an unknown function. The manipulation of the argument username leads to basic cross site scripting (Persistent). It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component."}]},"generator":"vuldb.com","impact":{"cvss":{"baseScore":"4.3","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-80 Basic Cross Site Scripting"}]}]},"references":{"reference_data":[{"name":"http://seclists.org/fulldisclosure/2017/Feb/36","refsource":"MISC","url":"http://seclists.org/fulldisclosure/2017/Feb/36"},{"name":"https://vuldb.com/?id.97254","refsource":"MISC","url":"https://vuldb.com/?id.97254"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T21:45:25.199Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2017/Feb/36"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://vuldb.com/?id.97254"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T17:13:14.973775Z","id":"CVE-2017-20057","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T14:20:19.971Z"}}]},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2017-20057","datePublished":"2022-06-20T04:50:25.000Z","dateReserved":"2022-06-18T00:00:00.000Z","dateUpdated":"2025-04-15T14:20:19.971Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}