Vulnerability Details : CVE-2013-1942
Multiple cross-site scripting (XSS) vulnerabilities in actionscript/Jplayer.as in the Flash SWF component (jplayer.swf) in jPlayer before 2.2.20, as used in ownCloud Server before 5.0.4 and other products, allow remote attackers to inject arbitrary web script or HTML via the (1) jQuery or (2) id parameters, as demonstrated using document.write in the jQuery parameter, a different vulnerability than CVE-2013-2022 and CVE-2013-2023.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2013-1942
- cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.5.13:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.5.12:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:4.5.11:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:*:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.16:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.15:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.33:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.32:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.26:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.36:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.29:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.22:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.31:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.30:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.24:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.23:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:0.2.2:beta:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:0.2.1:beta:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:0.2.4:beta:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:0.2.3:beta:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.18:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.17:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.35:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.34:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.28:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.27:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.20:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:0.2.5:beta:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:happyworm:jplayer:2.2.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-1942
1.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-1942
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2013-1942
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-1942
-
http://marc.info/?l=oss-security&m=136773622321563&w=2
'Re: [oss-security] Re: CVE-2013-1942 jPlayer 2.2.19 XSS' - MARC
-
http://marc.info/?l=oss-security&m=136570964825921&w=2
'[oss-security] CVE-2013-1942 jPlayer 2.2.19 XSS' - MARC
-
https://github.com/happyworm/jPlayer/commit/e8ca190f7f972a6a421cb95f09e138720e40ed6d
Security Fix of Flash SWF that had enabled cookie theft · jplayer/jPlayer@e8ca190 · GitHubExploit;Patch
-
http://marc.info/?l=oss-security&m=136726705917858&w=2
'[oss-security] Re: CVE-2013-1942 jPlayer 2.2.19 XSS' - MARC
-
http://www.jplayer.org/2.3.0/release-notes/
404 Error : Page not found
-
http://seclists.org/fulldisclosure/2013/Apr/192
Full Disclosure: Vulnerabilities in jPlayer
-
http://www.securityfocus.com/bid/59030
jPlayer 'Jplayer.swf' Script Cross Site Scripting Vulnerability
-
http://owncloud.org/about/security/advisories/oC-SA-2013-014/
Security Advisories – ownCloud
Jump to