Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:rapid7:nexpose:6.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "957301F3-95BF-415A-A318-67C94C4D12AF", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Create Tags page of the Rapid7 Nexpose version 6.4.12 user interface, any authenticated user who has the capability to create tags can inject cross-site scripting (XSS) elements in the tag name field. Once this tag is viewed in the Tag Detail page of the Rapid7 Nexpose 6.4.12 UI by another authenticated user, the script is run in that user's browser context."}, {"lang": "es", "value": "En la p\u00e1gina Create Tags de la interfaz de usuario de Rapid7 Nexpose versi\u00f3n 6.4.12, cualquier usuario autenticado que tiene la capacidad de crear etiquetas puede inyectar elementos CSS en la etiqueta de campo de nombre. Por ejemplo, una etiqueta de nombre como \"AB\" es suficiente para explotar la vulnerabilidad. Una vez esta etiqueta se ve en la p\u00e1gina Tag Detail de la interfaz de usuario de Rapid7 Nexpose 6.4.12 por otro usuario autenticado, la secuencia se ejecuta en ese contexto del navegador del usuario."}], "id": "CVE-2016-9757", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0"}, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2016-12-20T22:59:00.350", "references": [{"source": "cve@rapid7.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/94996"}, {"source": "cve@rapid7.com", "tags": ["Vendor Advisory"], "url": "https://help.rapid7.com/nexpose/en-us/release-notes/#6.4.13"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/94996"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://help.rapid7.com/nexpose/en-us/release-notes/#6.4.13"}], "sourceIdentifier": "cve@rapid7.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}