cvelist/2020/24xxx/CVE-2020-24897.json

76 lines
2.3 KiB
JSON
Raw Normal View History

2020-08-28 07:11:31 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-08-29 20:01:25 +00:00
"ID": "CVE-2020-24897",
"STATE": "PUBLIC"
2020-08-28 07:11:31 +00:00
},
2020-08-29 20:01:25 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-08-28 07:11:31 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-08-29 20:01:25 +00:00
"value": "The Table Filter and Charts for Confluence Server app before 5.3.25 (for Atlassian Confluence) allow remote attackers to inject arbitrary HTML or JavaScript via cross site scripting (XSS) through the provided Markdown markup to the \"Table from CSV\" macro."
2020-08-28 07:11:31 +00:00
}
]
2020-08-29 20:01:25 +00:00
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://stiltsoft.atlassian.net/browse/VD-2",
"refsource": "MISC",
"name": "https://stiltsoft.atlassian.net/browse/VD-2"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AC:L/AV:N/A:L/C:H/I:H/PR:L/S:C/UI:R",
"version": "3.1"
}
2020-08-28 07:11:31 +00:00
}
}