Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-28158", "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "state": "PUBLISHED", "assignerShortName": "apache", "dateReserved": "2023-03-13T02:37:38.879Z", "datePublished": "2023-03-29T12:21:46.932Z", "dateUpdated": "2025-02-13T16:45:40.751Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Apache Archiva", "vendor": "Apache Software Foundation", "versions": [{"lessThan": "2.2.10", "status": "affected", "version": "2.0", "versionType": "maven"}]}], "credits": [{"lang": "en", "type": "finder", "value": "sandr0 (sandr0.xyz)"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Privilege escalation via stored XSS using the file upload service to upload malicious content.<br><span style=\"background-color: rgb(255, 255, 255);\">The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.</span><br><br>"}], "value": "Privilege escalation via stored XSS using the file upload service to upload malicious content.\nThe issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache", "dateUpdated": "2023-04-18T02:06:24.671Z"}, "references": [{"tags": ["vendor-advisory"], "url": "https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt"}, {"url": "http://www.openwall.com/lists/oss-security/2023/04/18/2"}], "source": {"discovery": "EXTERNAL"}, "title": "Apache Archiva privilege escalation", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T12:30:24.174Z"}, "title": "CVE Program Container", "references": [{"tags": ["vendor-advisory", "x_transferred"], "url": "https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt"}, {"url": "http://www.openwall.com/lists/oss-security/2023/04/18/2", "tags": ["x_transferred"]}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-23T15:12:27.939865Z", "id": "CVE-2023-28158", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-23T15:12:35.785Z"}}]}}