Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:commscope:ruckus_cloudpath_enrollment_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "C21536CD-2726-476D-A01C-1DF492A24F9A", "versionEndIncluding": "5.12.5538", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the web-based interface of the RUCKUS Cloudpath product on version 5.12 build 5538 or before to could allow a remote, unauthenticated attacker to execute persistent XSS and CSRF attacks against a user of the admin management interface. A successful attack, combined with a certain admin activity, could allow the attacker to gain full admin privileges on the exploited system."}, {"lang": "es", "value": "Una vulnerabilidad en la interfaz web del producto RUCKUS Cloudpath en la versi\u00f3n 5.12 build 5538 o anterior podr\u00eda permitir que un atacante remoto no autenticado ejecute ataques XSS y CSRF persistentes contra un usuario de la interfaz de gesti\u00f3n de administraci\u00f3n. Un ataque exitoso, combinado con una determinada actividad administrativa, podr\u00eda permitir al atacante obtener privilegios completos de administrador en el sistema explotado."}], "id": "CVE-2023-45992", "lastModified": "2024-11-21T08:27:43.217", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2023-10-19T19:15:16.223", "references": [{"source": "cve@mitre.org", "tags": ["Not Applicable"], "url": "http://ruckus.com"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/harry935/CVE-2023-45992"}, {"source": "cve@mitre.org", "tags": ["Broken Link"], "url": "https://server.cloudpath/"}, {"source": "cve@mitre.org", "tags": ["Broken Link"], "url": "https://server.cloudpath/admin/enrollmentData/"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://support.ruckuswireless.com/security_bulletins/322"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Not Applicable"], "url": "http://ruckus.com"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/harry935/CVE-2023-45992"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"], "url": "https://server.cloudpath/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"], "url": "https://server.cloudpath/admin/enrollmentData/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://support.ruckuswireless.com/security_bulletins/322"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}, {"lang": "en", "value": "CWE-352"}], "source": "nvd@nist.gov", "type": "Primary"}]}