Show plain JSON{"id": "CVE-2012-4543", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2013-01-04T22:55:01.930", "references": [{"url": "http://rhn.redhat.com/errata/RHSA-2012-1550.html", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0511.html", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/51482", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/56843", "source": "secalert@redhat.com"}, {"url": "http://www.securitytracker.com/id?1027846", "source": "secalert@redhat.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=864397", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2012-1550.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0511.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/51482", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/56843", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1027846", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=864397", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Certificate System (RHCS) before 8.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) pageStart or (2) pageSize to the displayCRL script, or (3) nonce variable to the profileProcess script."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Red Hat Certificate System (RHCS) anteriores a v8.1.3, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de(1) pageStart o (2) pageSize sobre el script displayCRL, o (3) variable nonce sobre sobre el script profileProcess."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:redhat:certificate_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AAB4016-809B-4BF9-875C-18B261050AA9", "versionEndIncluding": "8.1.1"}, {"criteria": "cpe:2.3:a:redhat:certificate_system:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A94B7103-11B7-4B1E-AE02-86210F9CCCAA"}, {"criteria": "cpe:2.3:a:redhat:certificate_system:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27FE079E-FB15-443C-BE2E-1D4C940BB8C0"}, {"criteria": "cpe:2.3:a:redhat:certificate_system:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2654E6A-190C-4D5C-ABC0-89011DD8E293"}, {"criteria": "cpe:2.3:a:redhat:certificate_system:8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2EF75FF-FCDB-433C-A7B9-4DBAABAC6643"}, {"criteria": "cpe:2.3:a:redhat:certificate_system:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "969F1FDC-EB66-4758-B619-C48CA1E5B1AC"}, {"criteria": "cpe:2.3:a:redhat:certificate_system:8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25F5AA3E-5776-4B66-A2B7-78A95C37581A"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}