Vulnerability Details : CVE-2013-2136
Multiple cross-site scripting (XSS) vulnerabilities in Apache CloudStack before 4.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) Physical network name to the Zone wizard; (2) New network name, (3) instance name, or (4) group to the Instance wizard; (5) unspecified "multi-edit fields;" and (6) unspecified "list view" edit fields related to global settings.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2013-2136
Probability of exploitation activity in the next 30 days: 0.27%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 64 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-2136
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2013-2136
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-2136
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/86258
Apache CloudStack text fields cross-site scripting CVE-2013-2136 Vulnerability Report
-
https://issues.apache.org/jira/browse/CLOUDSTACK-2936
Log in - ASF JIRA
-
http://archives.neohapsis.com/archives/bugtraq/2013-08/0047.html
-
http://archives.neohapsis.com/archives/bugtraq/2013-08/0034.html
-
http://www.securityfocus.com/bid/61638
Apache CloudStack CVE-2013-2136 Multiple Cross Site Scripting Vulnerabilities
Products affected by CVE-2013-2136
- cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:4.0.0:incubating:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.0:-:community:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cloudstack:2.2.8:*:*:*:*:*:*:*