{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2018-25054","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2022-12-28T11:23:06.431Z","datePublished":"2022-12-28T11:24:01.839Z","dateUpdated":"2024-11-19T19:46:17.240Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2022-12-28T11:24:01.839Z"},"title":"shred cilla Search search.jsp cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"shred","product":"cilla","versions":[{"version":"n/a","status":"affected"}],"modules":["Search Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in shred cilla. It has been classified as problematic. Affected is an unknown function of the file cilla-xample/src/main/webapp/WEB-INF/jsp/view/search.jsp of the component Search Handler. The manipulation of the argument details leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is d345e6bc7798bd717a583ec7f545ca387819d5c7. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216960."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in shred cilla ausgemacht. Es betrifft eine unbekannte Funktion der Datei cilla-xample/src/main/webapp/WEB-INF/jsp/view/search.jsp der Komponente Search Handler. Durch das Manipulieren des Arguments details mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Patch wird als d345e6bc7798bd717a583ec7f545ca387819d5c7 bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}}],"timeline":[{"time":"2022-12-28T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2022-12-28T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2022-12-28T12:28:59.000Z","lang":"en","value":"VulDB last update"}],"references":[{"url":"https://vuldb.com/?id.216960","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.216960","tags":["signature","permissions-required"]},{"url":"https://github.com/shred/cilla/commit/d345e6bc7798bd717a583ec7f545ca387819d5c7","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T12:26:39.635Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.216960","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.216960","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/shred/cilla/commit/d345e6bc7798bd717a583ec7f545ca387819d5c7","tags":["patch","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-02-29T20:12:45.737651Z","id":"CVE-2018-25054","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-19T19:46:17.240Z"}}]}}