Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://archives.neohapsis.com/archives/bugtraq/2008-02/0444.html", "name": "20080227 Re: Mambo 4.6.3 Path Disclosure, XSS , XSRF, DOS", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.vupen.com/english/advisories/2008/0325", "name": "ADV-2008-0325", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "http://forum.mambo-foundation.org/showthread.php?t=10158", "name": "http://forum.mambo-foundation.org/showthread.php?t=10158", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/28670", "name": "28670", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.bugreport.ir/index_33.htm", "name": "http://www.bugreport.ir/index_33.htm", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://osvdb.org/42531", "name": "42531", "tags": ["Exploit"], "refsource": "OSVDB"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39985", "name": "mambo-connector-csrf(39985)", "tags": [], "refsource": "XF"}, {"url": "http://www.securityfocus.com/archive/1/487128/100/200/threaded", "name": "20080128 Mambo 4.6.3 Path Disclosure, XSS , XSRF, DOS", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in administrator/index2.php in MOStlyCE before 2.4, as used in Mambo 4.6.3 and earlier, allows remote attackers to hijack the authentication of administrators for requests that add new administrator accounts via the save task in a com_users action, as demonstrated using a separate XSS vulnerability in mambots/editors/mostlyce/jscripts/tiny_mce/filemanager/connectors/php/connector.php."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-352"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2008-7214", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}}, "publishedDate": "2009-09-11T16:30Z", "configurations": {"nodes": [{"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:mambo-foundation:mambo:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "4.6.3"}, {"cpe23Uri": "cpe:2.3:a:mambo-foundation:mambo:4.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:brilaps:mostlyce:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "2.0"}]}], "operator": "AND", "cpe_match": []}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-11T20:58Z"}