Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:microchip:syncserver_s100_firmware:2.90.70.3:*:*:*:*:*:*:*", "matchCriteriaId": "74360361-840A-4934-9E74-C216CDF3E257", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:microchip:syncserver_s100:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE4FB24A-DA03-4C4D-BF7C-BC5C26E9CF79", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:microchip:syncserver_s200_firmware:1.30:*:*:*:*:*:*:*", "matchCriteriaId": "966CD4CC-FC78-47BA-BB8D-82ADDED46089", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:microchip:syncserver_s200:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF3CDFD8-9C39-495E-820F-7379510C7A09", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:microchip:syncserver_s250_firmware:1.25:*:*:*:*:*:*:*", "matchCriteriaId": "37E30BDA-AD90-457B-950A-589AF1428725", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:microchip:syncserver_s250:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A583CDA-6568-4F67-8DC5-302B9644EFCE", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:microchip:syncserver_s300_firmware:2.65.0:*:*:*:*:*:*:*", "matchCriteriaId": "68C01BFD-1C7E-4E10-B3B7-2CF87E18FD26", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:microchip:syncserver_s300:-:*:*:*:*:*:*:*", "matchCriteriaId": "76A0C258-0C4D-4402-A0D0-61C247E24964", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:microchip:syncserver_s350_firmware:2.80.1:*:*:*:*:*:*:*", "matchCriteriaId": "B41D65CF-FD5E-4508-9FAF-8CB7F573F650", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:microchip:syncserver_s350:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BAF33D-CB50-4AB6-9B39-DF56968CE59C", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow stored XSS via the newUserName parameter on the \"User Creation, Deletion and Password Maintenance\" screen (when creating a new user)."}, {"lang": "es", "value": "Los dispositivos Symmetricom SyncServer S100 versi\u00f3n 2.90.70.3, S200 versi\u00f3n 1.30, S250 versi\u00f3n 1.25, S300 versi\u00f3n 2.65.0 y S350 versi\u00f3n 2.80.1, permiten un ataque de tipo XSS almacenado por medio del par\u00e1metro newUserName en la pantalla \"User Creation, Deletion and Password Maintenance\" (cuando se crea un nuevo usuario)."}], "id": "CVE-2020-9028", "lastModified": "2024-11-21T05:39:51.643", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-02-17T04:15:11.327", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://sku11army.blogspot.com/2020/01/symmetricom-syncserver_95.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://sku11army.blogspot.com/2020/01/symmetricom-syncserver_95.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}