Show plain JSON{"id": "CVE-2016-4056", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.0", "baseScore": 6.1, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 2.8}]}, "published": "2017-01-23T21:59:01.377", "references": [{"url": "http://www.openwall.com/lists/oss-security/2016/04/21/1", "tags": ["Mailing List"], "source": "cve@mitre.org"}, {"url": "https://labs.integrity.pt/advisories/cve-pending-stored-cross-site-scripting-in-typo3-bookmarks/", "tags": ["Exploit", "Technical Description", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2016-006/", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.openwall.com/lists/oss-security/2016/04/21/1", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://labs.integrity.pt/advisories/cve-pending-stored-cross-site-scripting-in-typo3-bookmarks/", "tags": ["Exploit", "Technical Description", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2016-006/", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Backend component in TYPO3 6.2.x before 6.2.19 allows remote attackers to inject arbitrary web script or HTML via the module parameter when creating a bookmark."}, {"lang": "es", "value": "Vulnerabilidad de XSS en el componente Backend en TYPO3 6.2.x en versiones anteriores a 6.2.19 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de el par\u00e1metro module cuando crea un marcador."}], "lastModified": "2025-04-20T01:37:25.860", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:typo3:typo3:6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7715060-1441-4CF9-BEDF-91D28FE31ECC"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29602159-5C1E-4C5A-9E4C-F3183D3EA8A3"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52CC6148-48F9-4532-96D3-8C6D82B8B815"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E501EDED-B7DC-4D00-9DAF-862BC8C14C60"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7183456A-52B4-4386-8979-A2ECEA9959FE"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16EEC79F-3293-451C-864E-9CE020F6C730"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FD27EAD-04D5-4C55-952E-020954B90CEF"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F67C62FD-A683-43F3-BF0E-D368617B194C"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.0:beta5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CCC09EC-CB2C-466A-BD71-4DD2C34288B1"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.0:beta6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82F45E35-4731-4527-861F-3999ABED94B7"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.0:beta7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC154041-5B1B-484C-8EF8-9EBC73A9FF3C"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36E925BE-8D4F-49FE-90EF-68C1DE776107"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA0AF154-CC16-4536-B120-A9040CE92394"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99262E73-E4A7-4657-A32E-3C289C052675"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E230A800-B2DE-4ED4-9C6B-961832C39900"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A96891D-A2B1-492C-A914-51F9631D5C40"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D7316A8-E445-45C6-BFD9-8E19254AC7AA"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D95C12B4-51F1-4FFC-892B-1432D1E5219A"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "308EF598-B9DF-47C5-A1AC-1A2A16767E84"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A3A5E5D-E8A9-4B2F-B423-9F1B9E761A9E"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B9EDF6E-299A-4277-9C2F-B25D5F9A189E"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "313D0192-8849-4DA1-820E-28E2FC4E37C4"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "265DCFF8-2EC5-49EA-8D06-1956F3109F09"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.10:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D8FB68B-E4E8-4501-94F6-2922781D8C16"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F1FEAA4-B0D8-4B5B-8958-173245F55134"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E806A38-C603-4916-93E2-FE43062B09C2"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17EB5B78-0AD1-4259-8537-058D888B30B8"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06C7E6FD-99D0-4F48-B5DF-0EFD4C05079D"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21217A49-637C-4F60-B8F8-8699E71D6BFC"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8ECD9604-F523-4BA0-A49F-5EF80A478263"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6CF3415-EA27-4AEF-AFDB-395ED8F9E009"}, {"criteria": "cpe:2.3:a:typo3:typo3:6.2.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E428C4A9-0FEB-4501-936A-9FB439D0E4AA"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}