Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://packetstormsecurity.org/files/116433", "name": "http://packetstormsecurity.org/files/116433", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://www.subrion.com/forums/announcements/934-subrion-2-2-3-open-source-cms-core-available.html", "name": "http://www.subrion.com/forums/announcements/934-subrion-2-2-3-open-source-cms-core-available.html", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "https://www.htbridge.com/advisory/HTB23113", "name": "https://www.htbridge.com/advisory/HTB23113", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0096.html", "name": "20121017 Multiple vulnerabilities in Subrion CMS", "tags": ["Exploit"], "refsource": "BUGTRAQ"}, {"url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5106.php", "name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5106.php", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://www.osvdb.org/85999", "name": "85999", "tags": [], "refsource": "OSVDB"}, {"url": "http://secunia.com/advisories/51013", "name": "51013", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://packetstormsecurity.org/files/117460/Subrion-CMS-2.2.1-XSS-CSRF-SQL-Injection.html", "name": "http://packetstormsecurity.org/files/117460/Subrion-CMS-2.2.1-XSS-CSRF-SQL-Injection.html", "tags": [], "refsource": "MISC"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79469", "name": "subrioncms-add-csrf(79469)", "tags": [], "refsource": "XF"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78469", "name": "subrioncms-addadmin-csrf(78469)", "tags": [], "refsource": "XF"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Subrion CMS before 2.2.3 allow remote attackers to hijack the authentication of administrators for requests that add, delete, or modify sensitive information, as demonstrated by adding an administrator account via an add action to admin/accounts/add/."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-352"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2012-4773", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}}, "publishedDate": "2012-10-22T23:55Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:intelliants:subrion_cms:2.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:intelliants:subrion_cms:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "2.2.2"}, {"cpe23Uri": "cpe:2.3:a:intelliants:subrion_cms:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:intelliants:subrion_cms:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2017-08-29T01:32Z"}