From 563c530ea824fe3802888b5538e5071fc6d126d4 Mon Sep 17 00:00:00 2001 From: Madison Oliver Date: Fri, 10 Apr 2020 14:30:31 -0400 Subject: [PATCH] CVE for VU#660597 --- 2020/9xxx/CVE-2020-9056.json | 93 +++++++++++++++++++++++++++++++++--- 1 file changed, 87 insertions(+), 6 deletions(-) diff --git a/2020/9xxx/CVE-2020-9056.json b/2020/9xxx/CVE-2020-9056.json index a9b13b39305..a659a04674f 100644 --- a/2020/9xxx/CVE-2020-9056.json +++ b/2020/9xxx/CVE-2020-9056.json @@ -1,18 +1,99 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cert@cert.org", + "DATE_PUBLIC": "2019-04-12T00:00:00.000Z", "ID": "CVE-2020-9056", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Periscope BuySpeed version 14.5 is vulnerable to stored cross-site scripting" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "BuySpeed", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "14.5", + "version_value": "14.5" + } + ] + } + } + ] + }, + "vendor_name": "Periscope Holdings" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Periscope BuySpeed version 14.5 is vulnerable to stored cross-site scripting, which could allow a local, authenticated attacker to store arbitrary JavaScript within the application. This JavaScript is subsequently displayed by the application without sanitization and is executed in the browser of the user, which could possibly cause website redirection, session hijacking, or information disclosure. This vulnerability has been patched in BuySpeed version 15.3." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 3.9, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "VU#660597", + "refsource": "CERT-VN", + "url": "https://kb.cert.org/vuls/id/660597/" + }, + { + "name": "https://support.buyspeed.com/hc/en-us/articles/360035773831-Buyspeed-15-3-0-Release-Notes", + "refsource": "MISC", + "url": "https://support.buyspeed.com/hc/en-us/articles/360035773831-Buyspeed-15-3-0-Release-Notes" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "This vulnerability has been patched in BuySpeed version 15.3." + } + ], + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file