Vulnerabilites related to grandstream - gxv3615w\/p
Vulnerability from fkie_nvd
Published
2013-10-01 19:55
Modified
2024-11-21 01:54
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in goform/usermanage in Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models allows remote attackers to hijack the authentication of unspecified victims for requests that add users.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53F7233B-3C46-47AA-8FD2-5972F04C15AF",
              "versionEndIncluding": "1.0.4.43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "612208E1-B2B0-4E4F-921A-4368F805515E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "86535E57-635F-4AD8-AE00-FD5D00E3684A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "90713ED3-8DD4-488C-A901-47D636A7A21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "21CC85FD-7293-4187-910F-9E010841EBB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EEF0F10-D63E-4931-882C-CBA6BBE33F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02E4C11-DD10-4F22-B5E7-0A490D9D4760",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "1338E5F7-4EE3-4244-8E1F-2ABA50054DC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9D7074F-CC2B-4EED-98EA-4C895EC5EA9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA71D8D0-6A8E-475A-9E0E-845CBA2B7D4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4DC610-777B-4F3B-8B92-5D7771CD8BBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "F76307FE-851E-44CE-9248-5F5CE7ECB2F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9D58580-E3E1-485C-A560-93E77F3F196C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEAEBA7D-656D-4520-94CE-370A5712A380",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1550A087-E35E-44EE-A19F-C69EB173E49B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3504:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83A4BA5B-1996-4527-960C-492FD9400003",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5CAAD0-A565-4B3A-B022-BD0130914383",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3601hd\\/ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73DB8462-2203-41F2-8C31-FD074240DC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3611hd\\/ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C4FE33-DBB7-44A9-BFC4-11A47667533C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3615w\\/p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B3ECC3C-43BD-4ABC-B2D7-45982BE4B929",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3615wp_hd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C79390F8-EC97-4922-81C9-184B630E8AB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3651fhd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00BE6AEB-930F-471F-9DF8-1B8148557ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3662hd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36362F8F-92D6-4475-AADB-6D02971E1025",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability in goform/usermanage in Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models allows remote attackers to hijack the authentication of unspecified victims for requests that add users."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de CSRF en goform/usermanage en Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, y posiblemente otros modelos de c\u00e1mara permite a atacantes remotos secuestrar la autenticaci\u00f3n de v\u00edctimas sin especificar para peticiones que incluyan usuarios."
    }
  ],
  "id": "CVE-2013-3963",
  "lastModified": "2024-11-21T01:54:38.043",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-10-01T19:55:09.443",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-10-01 19:55
Modified
2024-11-21 01:54
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models before firmware 1.0.4.44, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53F7233B-3C46-47AA-8FD2-5972F04C15AF",
              "versionEndIncluding": "1.0.4.43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "612208E1-B2B0-4E4F-921A-4368F805515E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "86535E57-635F-4AD8-AE00-FD5D00E3684A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "90713ED3-8DD4-488C-A901-47D636A7A21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "21CC85FD-7293-4187-910F-9E010841EBB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EEF0F10-D63E-4931-882C-CBA6BBE33F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02E4C11-DD10-4F22-B5E7-0A490D9D4760",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "1338E5F7-4EE3-4244-8E1F-2ABA50054DC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9D7074F-CC2B-4EED-98EA-4C895EC5EA9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA71D8D0-6A8E-475A-9E0E-845CBA2B7D4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4DC610-777B-4F3B-8B92-5D7771CD8BBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "F76307FE-851E-44CE-9248-5F5CE7ECB2F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:grandstream:gxv_device_firmware:1.0.4.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9D58580-E3E1-485C-A560-93E77F3F196C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEAEBA7D-656D-4520-94CE-370A5712A380",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1550A087-E35E-44EE-A19F-C69EB173E49B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3504:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83A4BA5B-1996-4527-960C-492FD9400003",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5CAAD0-A565-4B3A-B022-BD0130914383",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3601hd\\/ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73DB8462-2203-41F2-8C31-FD074240DC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3611hd\\/ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C4FE33-DBB7-44A9-BFC4-11A47667533C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3615w\\/p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B3ECC3C-43BD-4ABC-B2D7-45982BE4B929",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3615wp_hd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C79390F8-EC97-4922-81C9-184B630E8AB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3651fhd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00BE6AEB-930F-471F-9DF8-1B8148557ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:grandstream:gxv3662hd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36362F8F-92D6-4475-AADB-6D02971E1025",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models before firmware 1.0.4.44, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de XSS en Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, y posiblemente otros modelos de c\u00e1mara anteriores al firmware 1.0.4.44, permite a atacantes remotos inyectar script web arbitrario o HTML a trav\u00e9s de PATH_INFO."
    }
  ],
  "id": "CVE-2013-3962",
  "lastModified": "2024-11-21T01:54:37.900",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-10-01T19:55:09.427",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.grandstream.com/firmware/BETATEST/GXV35xx_GXV36xx_H/Release_Note_GXV35xx_GXV36xx_H1.0.4.44.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.grandstream.com/firmware/BETATEST/GXV35xx_GXV36xx_H/Release_Note_GXV35xx_GXV36xx_H1.0.4.44.pdf"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2013-3963
Vulnerability from cvelistv5
Published
2013-10-01 19:00
Modified
2024-09-16 17:18
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in goform/usermanage in Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models allows remote attackers to hijack the authentication of unspecified victims for requests that add users.
References
http://seclists.org/fulldisclosure/2013/Jun/84mailing-list, x_refsource_FULLDISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:30:49.344Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130612 Security Analysis of IP video surveillance cameras",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in goform/usermanage in Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models allows remote attackers to hijack the authentication of unspecified victims for requests that add users."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-10-01T19:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20130612 Security Analysis of IP video surveillance cameras",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-3963",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in goform/usermanage in Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models allows remote attackers to hijack the authentication of unspecified victims for requests that add users."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130612 Security Analysis of IP video surveillance cameras",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-3963",
    "datePublished": "2013-10-01T19:00:00Z",
    "dateReserved": "2013-06-06T00:00:00Z",
    "dateUpdated": "2024-09-16T17:18:50.218Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-3962
Vulnerability from cvelistv5
Published
2013-10-01 19:00
Modified
2024-09-17 00:40
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models before firmware 1.0.4.44, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:30:49.085Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130612 Security Analysis of IP video surveillance cameras",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.grandstream.com/firmware/BETATEST/GXV35xx_GXV36xx_H/Release_Note_GXV35xx_GXV36xx_H1.0.4.44.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models before firmware 1.0.4.44, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-10-01T19:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20130612 Security Analysis of IP video surveillance cameras",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.grandstream.com/firmware/BETATEST/GXV35xx_GXV36xx_H/Release_Note_GXV35xx_GXV36xx_H1.0.4.44.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-3962",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models before firmware 1.0.4.44, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130612 Security Analysis of IP video surveillance cameras",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
            },
            {
              "name": "http://www.grandstream.com/firmware/BETATEST/GXV35xx_GXV36xx_H/Release_Note_GXV35xx_GXV36xx_H1.0.4.44.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.grandstream.com/firmware/BETATEST/GXV35xx_GXV36xx_H/Release_Note_GXV35xx_GXV36xx_H1.0.4.44.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-3962",
    "datePublished": "2013-10-01T19:00:00Z",
    "dateReserved": "2013-06-06T00:00:00Z",
    "dateUpdated": "2024-09-17T00:40:40.473Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-201310-0248
Vulnerability from variot

Cross-site request forgery (CSRF) vulnerability in goform/usermanage in Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models allows remote attackers to hijack the authentication of unspecified victims for requests that add users. The telnet service in multiple Grandstream products uses a built-in account that allows remote attackers to use this account to gain unauthorized access to factory reset or upgrade firmware. Grandstream is an IP phone, network video surveillance solution vendor. There are cross-site request forgery vulnerabilities in multiple products of the Grandstream WEB interface, allowing attackers to build malicious URIs, enticing login users to resolve, and performing malicious operations in the target user context, such as adding new users. The affected products are as follows: GXV3500GXV3501GXV3504GXV3601GXV3601HD/LLGXV3611HD/LLGXV3615W/PGXV3615WP_HDGXV3651FHDGXV3662HD. Grandstream multiple IP cameras including GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, and GXV3500 are prone to a cross-site request-forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks. Grandstream GXV3501 and others are network camera products of American Grandstream Networks (Grandstream) company. =============================================================================== GRANDSTREAM ==================================================================== ===============================================================================

1.Advisory Information Title: Grandstream Series Vulnerabilities Date Published: 12/06/2013 Date of last updated: 12/06/2013

2.Vulnerability Description The following vulnerability has been found in these devices: -CVE-2013-3542. Backdoor in Telnet Protocol(CAPEC-443) -CVE-2013-3962. Cross Site Scripting(CWE-79) -CVE-2013-3963. -CVE-2013-3542, CVE-2013-3962 and CVE-2013-3963. It\x92s possible others models are affected but they were not checked.

4.PoC 4.1.Backdoor in Telnet Protocol CVE-2013-3542, Backdoor in Telnet Protocol You should connect via telnet protocol to any camera affected (it's open by default). After all you should be introduce the magic string \x93 !#/ \x94 as Username and as Password. You will get the admin panel setting menu. If you type "help", the following commands are shown: ======================================================= help, quit, status, restart, restore, upgrade, tty_test ======================================================= @@@ restore (Reset settings to factory default)

The attacker can take the device control, so it's make this devices very vulnerables.

4.2.Cross Site Scripting (XSS) CVE-2013-3962, Cross Site Scripting non-persistent.

http://xx.xx.xx.xx/alert(123)

4.3.Cross Site Request Forgery (CSRF) CVE-2013-3963, CSRF via GET method. A malicious user can try targeted attacks by sending a special CSRF vector. This allows you to manipulate web interface parameters. You should introduce the following URL to replicate the attack.

http://xx.xx.xx.xx/goform/usermanage?cmd=add&user.name=test3&user.password=test3&user.level=0

5.Credits -CVE-2013-3542, CVE-2013-3962 and CVE-2013-3963 were discovered by Jon\xe1s Ropero Castillo.

6.Report Timeline -2013-05-31: Students opens a ticket in order to notify the Grandstream Customer Support of the CVE-2013-3542. -2013-05-31: Grandstream team reports to the technical support to analyze the vulnerability. -2013-06-11: Students opens a ticket in order to notify the Grandstream Customer Support of the CVE-2013-3962 and CVE-2013-3963 vulnerabilities

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0248",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.16"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.3.9"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.37"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.27"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.7"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.38"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.6"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.34"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.2.3"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.11"
      },
      {
        "model": "gxv3501 gxv3504 ip video encoders",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "grandstream",
        "version": "/"
      },
      {
        "model": "gxv3500 ip video encoder/decoder",
        "scope": null,
        "trust": 1.2,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv series ip cameras",
        "scope": null,
        "trust": 1.2,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv device",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": "1.0.4.43"
      },
      {
        "model": "gxv3651fhd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3501",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3611hd\\/ll",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": "1.0.4.42"
      },
      {
        "model": "gxv3615wp hd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3615w\\/p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3662hd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3504",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": "1.0.4.39"
      },
      {
        "model": "gxv3601",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3601hd\\/ll",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "grandstream",
        "version": "1.0.4.43"
      },
      {
        "model": "gxv3500",
        "scope": null,
        "trust": 0.8,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3501",
        "scope": null,
        "trust": 0.8,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3504",
        "scope": null,
        "trust": 0.8,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3601",
        "scope": null,
        "trust": 0.8,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3601hd/ll",
        "scope": null,
        "trust": 0.8,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3611hd/ll",
        "scope": null,
        "trust": 0.8,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3615w/p",
        "scope": null,
        "trust": 0.8,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3615wp hd",
        "scope": null,
        "trust": 0.8,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3651fhd",
        "scope": null,
        "trust": 0.8,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3662hd",
        "scope": null,
        "trust": 0.8,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3662hd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3651fhd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3615wp hd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3615w/p",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3611hd/ll",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3601hd/ll",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3601",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3504",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3501",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3500",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08564"
      },
      {
        "db": "BID",
        "id": "60532"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-258"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3963"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:grandstream:gxv_device_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3500",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3501",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3504",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3601",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3601hd%2fll",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3611hd%2fll",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3615w%2fp",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3615wp_hd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3651fhd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3662hd",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004459"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "JonAis Ropero Castillo",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-258"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2013-3963",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2013-3963",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2013-08565",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "CNVD-2013-08564",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-63965",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-3963",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-3963",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-08565",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-08564",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201306-258",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-63965",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08564"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63965"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-258"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3963"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site request forgery (CSRF) vulnerability in goform/usermanage in Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models allows remote attackers to hijack the authentication of unspecified victims for requests that add users. The telnet service in multiple Grandstream products uses a built-in account that allows remote attackers to use this account to gain unauthorized access to factory reset or upgrade firmware. Grandstream is an IP phone, network video surveillance solution vendor. There are cross-site request forgery vulnerabilities in multiple products of the Grandstream WEB interface, allowing attackers to build malicious URIs, enticing login users to resolve, and performing malicious operations in the target user context, such as adding new users. The affected products are as follows: GXV3500GXV3501GXV3504GXV3601GXV3601HD/LLGXV3611HD/LLGXV3615W/PGXV3615WP_HDGXV3651FHDGXV3662HD. Grandstream multiple IP cameras  including GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL,  GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, and GXV3500 are prone to a cross-site request-forgery vulnerability. \nExploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks. Grandstream GXV3501 and others are network camera products of American Grandstream Networks (Grandstream) company. ===============================================================================\nGRANDSTREAM\n====================================================================\n===============================================================================\n\n1.Advisory Information\nTitle: Grandstream Series Vulnerabilities\nDate Published: 12/06/2013\nDate of last updated: 12/06/2013\n\n2.Vulnerability Description\nThe following vulnerability has been found in these devices:\n-CVE-2013-3542. Backdoor in Telnet Protocol(CAPEC-443)\n-CVE-2013-3962. Cross Site Scripting(CWE-79)\n-CVE-2013-3963. \n-CVE-2013-3542, CVE-2013-3962 and CVE-2013-3963. \nIt\\x92s possible others models are affected but they were not checked. \n\n4.PoC\n4.1.Backdoor in Telnet Protocol\nCVE-2013-3542, Backdoor in Telnet Protocol\nYou should connect via telnet protocol to any camera affected (it\u0027s open by default). \nAfter all you should be introduce the magic string \\x93 !#/ \\x94 as Username and as Password. \nYou will get the admin panel setting menu. If you type \"help\", the following commands are shown:\n=======================================================\nhelp, quit, status, restart, restore, upgrade, tty_test\n=======================================================\n @@@ restore (Reset settings to factory default)\n\nThe attacker can take the device control, so it\u0027s make this devices very vulnerables. \n\n4.2.Cross Site Scripting (XSS)\nCVE-2013-3962, Cross Site Scripting non-persistent. \n_____________________________________________________________________________\nhttp://xx.xx.xx.xx/\u003cscript\u003ealert(123)\u003c/script\u003e\n_____________________________________________________________________________\n\n4.3.Cross Site Request Forgery (CSRF)\nCVE-2013-3963, CSRF via GET method. \nA malicious user can try targeted attacks by sending a special CSRF vector. This allows you to manipulate web interface parameters. \nYou should introduce the following URL to replicate the attack. \n_____________________________________________________________________________\nhttp://xx.xx.xx.xx/goform/usermanage?cmd=add\u0026user.name=test3\u0026user.password=test3\u0026user.level=0\n_____________________________________________________________________________\n\n5.Credits\n-CVE-2013-3542, CVE-2013-3962 and CVE-2013-3963 were discovered by Jon\\xe1s Ropero Castillo. \n\n6.Report Timeline\n-2013-05-31: Students opens a ticket in order to notify the Grandstream Customer Support of the CVE-2013-3542. \n-2013-05-31: Grandstream team reports to the technical support to analyze the vulnerability. \n-2013-06-11: Students opens a ticket in order to notify the Grandstream Customer Support of the CVE-2013-3962 and CVE-2013-3963 vulnerabilities",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-3963"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004459"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08564"
      },
      {
        "db": "BID",
        "id": "60532"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63965"
      },
      {
        "db": "PACKETSTORM",
        "id": "122004"
      }
    ],
    "trust": 3.15
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-63965",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63965"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-3963",
        "trust": 3.5
      },
      {
        "db": "BID",
        "id": "60532",
        "trust": 1.6
      },
      {
        "db": "PACKETSTORM",
        "id": "122004",
        "trust": 1.3
      },
      {
        "db": "SECUNIA",
        "id": "53763",
        "trust": 1.2
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004459",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-258",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08564",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20130612 SECURITY ANALYSIS OF IP VIDEO SURVEILLANCE CAMERAS",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "38584",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-63965",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08564"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63965"
      },
      {
        "db": "BID",
        "id": "60532"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004459"
      },
      {
        "db": "PACKETSTORM",
        "id": "122004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-258"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3963"
      }
    ]
  },
  "id": "VAR-201310-0248",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08564"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63965"
      }
    ],
    "trust": 1.9419642857142856
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 1.2
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08564"
      }
    ]
  },
  "last_update_date": "2024-11-23T19:42:20.052000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.grandstream.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004459"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-352",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63965"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004459"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3963"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://seclists.org/fulldisclosure/2013/jun/84"
      },
      {
        "trust": 1.2,
        "url": "http://www.secunia.com/advisories/53763/"
      },
      {
        "trust": 1.2,
        "url": "http://packetstormsecurity.com/files/122004/grandstream-backdoor-cross-site-request-forgery-cross-site-scripting.html"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3963"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3963"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/60532"
      },
      {
        "trust": 0.3,
        "url": "http://www.grandstream.com/index.php/products/ip-video-surveillance"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-3963"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-3542"
      },
      {
        "trust": 0.1,
        "url": "http://xx.xx.xx.xx/\u003cscript\u003ealert(123)\u003c/script\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://xx.xx.xx.xx/goform/usermanage?cmd=add\u0026user.name=test3\u0026user.password=test3\u0026user.level=0"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-3962"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08564"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63965"
      },
      {
        "db": "BID",
        "id": "60532"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004459"
      },
      {
        "db": "PACKETSTORM",
        "id": "122004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-258"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3963"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08564"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63965"
      },
      {
        "db": "BID",
        "id": "60532"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004459"
      },
      {
        "db": "PACKETSTORM",
        "id": "122004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-258"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3963"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-07-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "date": "2013-07-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-08564"
      },
      {
        "date": "2013-10-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63965"
      },
      {
        "date": "2013-06-12T00:00:00",
        "db": "BID",
        "id": "60532"
      },
      {
        "date": "2013-10-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-004459"
      },
      {
        "date": "2013-06-13T06:12:41",
        "db": "PACKETSTORM",
        "id": "122004"
      },
      {
        "date": "2013-06-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201306-258"
      },
      {
        "date": "2013-10-01T19:55:09.443000",
        "db": "NVD",
        "id": "CVE-2013-3963"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-07-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "date": "2013-07-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-08564"
      },
      {
        "date": "2013-10-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63965"
      },
      {
        "date": "2013-06-12T00:00:00",
        "db": "BID",
        "id": "60532"
      },
      {
        "date": "2013-10-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-004459"
      },
      {
        "date": "2013-10-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201306-258"
      },
      {
        "date": "2024-11-21T01:54:38.043000",
        "db": "NVD",
        "id": "CVE-2013-3963"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-258"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Grandstream Product  goform/usermanage Vulnerable to cross-site request forgery",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004459"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cross-site request forgery",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-258"
      }
    ],
    "trust": 0.6
  }
}

var-201310-0247
Vulnerability from variot

Cross-site scripting (XSS) vulnerability in Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models before firmware 1.0.4.44, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. Unknown cross-site scripting vulnerabilities existed in multiple IP Cameras from Grandstream. Grandstream is an IP phone, network video surveillance solution vendor. The telnet service in multiple Grandstream products uses a built-in account that allows remote attackers to use this account to gain unauthorized access to factory reset or upgrade firmware. The affected products are as follows: GXV3500GXV3501GXV3504GXV3601GXV3601HD/LLGXV3611HD/LLGXV3615W/PGXV3615WP_HDGXV3651FHDGXV3662HD. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected device. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. Grandstream GXV3501 and others are network camera products of American Grandstream Networks (Grandstream) company. =============================================================================== GRANDSTREAM ==================================================================== ===============================================================================

1.Advisory Information Title: Grandstream Series Vulnerabilities Date Published: 12/06/2013 Date of last updated: 12/06/2013

2.Vulnerability Description The following vulnerability has been found in these devices: -CVE-2013-3542. Backdoor in Telnet Protocol(CAPEC-443) -CVE-2013-3962. Cross Site Scripting(CWE-79) -CVE-2013-3963. -CVE-2013-3542, CVE-2013-3962 and CVE-2013-3963. It\x92s possible others models are affected but they were not checked.

4.PoC 4.1.Backdoor in Telnet Protocol CVE-2013-3542, Backdoor in Telnet Protocol You should connect via telnet protocol to any camera affected (it's open by default). After all you should be introduce the magic string \x93 !#/ \x94 as Username and as Password. You will get the admin panel setting menu. If you type "help", the following commands are shown: ======================================================= help, quit, status, restart, restore, upgrade, tty_test ======================================================= @@@ restore (Reset settings to factory default)

The attacker can take the device control, so it's make this devices very vulnerables.

4.2.Cross Site Scripting (XSS) CVE-2013-3962, Cross Site Scripting non-persistent.

http://xx.xx.xx.xx/alert(123)

4.3.Cross Site Request Forgery (CSRF) CVE-2013-3963, CSRF via GET method. These cameras use a web interface which is prone to CSRF vulnerabilities. A malicious user can try targeted attacks by sending a special CSRF vector. This allows you to manipulate web interface parameters. You should introduce the following URL to replicate the attack.

http://xx.xx.xx.xx/goform/usermanage?cmd=add&user.name=test3&user.password=test3&user.level=0

5.Credits -CVE-2013-3542, CVE-2013-3962 and CVE-2013-3963 were discovered by Jon\xe1s Ropero Castillo.

6.Report Timeline -2013-05-31: Students opens a ticket in order to notify the Grandstream Customer Support of the CVE-2013-3542. -2013-05-31: Grandstream team reports to the technical support to analyze the vulnerability. -2013-06-11: Students opens a ticket in order to notify the Grandstream Customer Support of the CVE-2013-3962 and CVE-2013-3963 vulnerabilities

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0247",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.16"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.3.9"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.42"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.27"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.7"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.38"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.6"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.39"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.2.3"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "grandstream",
        "version": "1.0.4.11"
      },
      {
        "model": "gxv3500",
        "scope": null,
        "trust": 1.4,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3615wp hd",
        "scope": null,
        "trust": 1.4,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3662hd",
        "scope": null,
        "trust": 1.4,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3651fhd",
        "scope": null,
        "trust": 1.4,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3615w/p",
        "scope": null,
        "trust": 1.4,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3611hd/ll",
        "scope": null,
        "trust": 1.4,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3601hd/ll",
        "scope": null,
        "trust": 1.4,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3601",
        "scope": null,
        "trust": 1.4,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3504",
        "scope": null,
        "trust": 1.4,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3501",
        "scope": null,
        "trust": 1.4,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv device",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": "1.0.4.43"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": "1.0.4.37"
      },
      {
        "model": "gxv device",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": "1.0.4.34"
      },
      {
        "model": "gxv3651fhd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3501",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3611hd\\/ll",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3615wp hd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3615w\\/p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3662hd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3504",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3601",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3601hd\\/ll",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "grandstream",
        "version": "1.0.4.44"
      },
      {
        "model": "gxv device",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "grandstream",
        "version": "\u003c=1.0.4.43"
      },
      {
        "model": "gxv3501 gxv3504 ip video encoders",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "grandstream",
        "version": "/"
      },
      {
        "model": "gxv3500 ip video encoder/decoder",
        "scope": null,
        "trust": 0.6,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv series ip cameras",
        "scope": null,
        "trust": 0.6,
        "vendor": "grandstream",
        "version": null
      },
      {
        "model": "gxv3662hd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3651fhd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3615wp hd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3615w/p",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3611hd/ll",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3601hd/ll",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3601",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3504",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3501",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      },
      {
        "model": "gxv3500",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "grandstream",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13693"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "db": "BID",
        "id": "60531"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004458"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-257"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3962"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:grandstream:gxv_device_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3500",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3501",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3504",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3601",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3601hd%2fll",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3611hd%2fll",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3615w%2fp",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3615wp_hd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3651fhd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:grandstream:gxv3662hd",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004458"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Jons Ropero Castillo.",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-257"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2013-3962",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2013-3962",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2013-13693",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2013-08565",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-63964",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-3962",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-3962",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-13693",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-08565",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201306-257",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-63964",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13693"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63964"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004458"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-257"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3962"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site scripting (XSS) vulnerability in Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models before firmware 1.0.4.44, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. Unknown cross-site scripting vulnerabilities existed in multiple IP Cameras from Grandstream. Grandstream is an IP phone, network video surveillance solution vendor. The telnet service in multiple Grandstream products uses a built-in account that allows remote attackers to use this account to gain unauthorized access to factory reset or upgrade firmware. The affected products are as follows: GXV3500GXV3501GXV3504GXV3601GXV3601HD/LLGXV3611HD/LLGXV3615W/PGXV3615WP_HDGXV3651FHDGXV3662HD. \nAn attacker may leverage this issue to execute arbitrary script code in  the browser of an unsuspecting user in the context of the affected device.  This can allow the attacker to steal cookie-based authentication  credentials and launch other attacks. Grandstream GXV3501 and others are network camera products of American Grandstream Networks (Grandstream) company. ===============================================================================\nGRANDSTREAM\n====================================================================\n===============================================================================\n\n1.Advisory Information\nTitle: Grandstream Series Vulnerabilities\nDate Published: 12/06/2013\nDate of last updated: 12/06/2013\n\n2.Vulnerability Description\nThe following vulnerability has been found in these devices:\n-CVE-2013-3542. Backdoor in Telnet Protocol(CAPEC-443)\n-CVE-2013-3962. Cross Site Scripting(CWE-79)\n-CVE-2013-3963. \n-CVE-2013-3542, CVE-2013-3962 and CVE-2013-3963. \nIt\\x92s possible others models are affected but they were not checked. \n\n4.PoC\n4.1.Backdoor in Telnet Protocol\nCVE-2013-3542, Backdoor in Telnet Protocol\nYou should connect via telnet protocol to any camera affected (it\u0027s open by default). \nAfter all you should be introduce the magic string \\x93 !#/ \\x94 as Username and as Password. \nYou will get the admin panel setting menu. If you type \"help\", the following commands are shown:\n=======================================================\nhelp, quit, status, restart, restore, upgrade, tty_test\n=======================================================\n @@@ restore (Reset settings to factory default)\n\nThe attacker can take the device control, so it\u0027s make this devices very vulnerables. \n\n4.2.Cross Site Scripting (XSS)\nCVE-2013-3962, Cross Site Scripting non-persistent. \n_____________________________________________________________________________\nhttp://xx.xx.xx.xx/\u003cscript\u003ealert(123)\u003c/script\u003e\n_____________________________________________________________________________\n\n4.3.Cross Site Request Forgery (CSRF)\nCVE-2013-3963, CSRF via GET method. \nThese cameras use a web interface which is prone to CSRF vulnerabilities. \nA malicious user can try targeted attacks by sending a special CSRF vector. This allows you to manipulate web interface parameters. \nYou should introduce the following URL to replicate the attack. \n_____________________________________________________________________________\nhttp://xx.xx.xx.xx/goform/usermanage?cmd=add\u0026user.name=test3\u0026user.password=test3\u0026user.level=0\n_____________________________________________________________________________\n\n5.Credits\n-CVE-2013-3542, CVE-2013-3962 and CVE-2013-3963 were discovered by Jon\\xe1s Ropero Castillo. \n\n6.Report Timeline\n-2013-05-31: Students opens a ticket in order to notify the Grandstream Customer Support of the CVE-2013-3542. \n-2013-05-31: Grandstream team reports to the technical support to analyze the vulnerability. \n-2013-06-11: Students opens a ticket in order to notify the Grandstream Customer Support of the CVE-2013-3962 and CVE-2013-3963 vulnerabilities",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-3962"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004458"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13693"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "db": "BID",
        "id": "60531"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63964"
      },
      {
        "db": "PACKETSTORM",
        "id": "122004"
      }
    ],
    "trust": 3.15
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-3962",
        "trust": 3.5
      },
      {
        "db": "BID",
        "id": "60531",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004458",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "122004",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-257",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13693",
        "trust": 0.6
      },
      {
        "db": "SECUNIA",
        "id": "53763",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20130612 SECURITY ANALYSIS OF IP VIDEO SURVEILLANCE CAMERAS",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-63964",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13693"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63964"
      },
      {
        "db": "BID",
        "id": "60531"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004458"
      },
      {
        "db": "PACKETSTORM",
        "id": "122004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-257"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3962"
      }
    ]
  },
  "id": "VAR-201310-0247",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13693"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63964"
      }
    ],
    "trust": 1.9419642857142856
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 1.2
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13693"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      }
    ]
  },
  "last_update_date": "2024-11-23T20:19:43.819000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Firmware Release Notes",
        "trust": 0.8,
        "url": "http://www.grandstream.com/firmware/BETATEST/GXV35xx_GXV36xx_H/Release_Note_GXV35xx_GXV36xx_H1.0.4.44.pdf"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004458"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63964"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004458"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3962"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://seclists.org/fulldisclosure/2013/jun/84"
      },
      {
        "trust": 2.3,
        "url": "http://www.grandstream.com/firmware/betatest/gxv35xx_gxv36xx_h/release_note_gxv35xx_gxv36xx_h1.0.4.44.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3962"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3962"
      },
      {
        "trust": 0.6,
        "url": "http://www.secunia.com/advisories/53763/"
      },
      {
        "trust": 0.6,
        "url": "http://packetstormsecurity.com/files/122004/grandstream-backdoor-cross-site-request-forgery-cross-site-scripting.html"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/60531"
      },
      {
        "trust": 0.3,
        "url": "http://www.grandstream.com/index.php/products/ip-video-surveillance"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-3963"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-3542"
      },
      {
        "trust": 0.1,
        "url": "http://xx.xx.xx.xx/\u003cscript\u003ealert(123)\u003c/script\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://xx.xx.xx.xx/goform/usermanage?cmd=add\u0026user.name=test3\u0026user.password=test3\u0026user.level=0"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-3962"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13693"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63964"
      },
      {
        "db": "BID",
        "id": "60531"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004458"
      },
      {
        "db": "PACKETSTORM",
        "id": "122004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-257"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3962"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13693"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63964"
      },
      {
        "db": "BID",
        "id": "60531"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004458"
      },
      {
        "db": "PACKETSTORM",
        "id": "122004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-257"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3962"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-10-14T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13693"
      },
      {
        "date": "2013-07-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "date": "2013-10-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63964"
      },
      {
        "date": "2013-06-12T00:00:00",
        "db": "BID",
        "id": "60531"
      },
      {
        "date": "2013-10-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-004458"
      },
      {
        "date": "2013-06-13T06:12:41",
        "db": "PACKETSTORM",
        "id": "122004"
      },
      {
        "date": "2013-06-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201306-257"
      },
      {
        "date": "2013-10-01T19:55:09.427000",
        "db": "NVD",
        "id": "CVE-2013-3962"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-10-14T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13693"
      },
      {
        "date": "2013-07-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-08565"
      },
      {
        "date": "2013-10-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63964"
      },
      {
        "date": "2013-06-12T00:00:00",
        "db": "BID",
        "id": "60531"
      },
      {
        "date": "2013-10-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-004458"
      },
      {
        "date": "2013-10-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201306-257"
      },
      {
        "date": "2024-11-21T01:54:37.900000",
        "db": "NVD",
        "id": "CVE-2013-3962"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-257"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Grandstream Product cross-site scripting vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004458"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XSS",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-257"
      }
    ],
    "trust": 0.6
  }
}