cvelist/2020/4xxx/CVE-2020-4051.json
2023-01-29 13:00:35 +00:00

118 lines
4.7 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2020-4051",
"STATE": "PUBLIC",
"TITLE": "XSS in Dijit Editor's LinkDialog plugin"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "dijit",
"version": {
"version_data": [
{
"version_value": "< 1.11.11"
},
{
"version_value": ">= 1.12.0, < 1.12.9"
},
{
"version_value": ">= 1.13.0, < 1.13.8"
},
{
"version_value": ">= 1.14.0, < 1.14.7"
},
{
"version_value": ">= 1.15.0, < 1.15.4"
},
{
"version_value": ">= 1.16.0, < 1.16.3"
}
]
}
}
]
},
"vendor_name": "Dojo"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Dijit before versions 1.11.11, and greater than or equal to 1.12.0 and less than 1.12.9, and greater than or equal to 1.13.0 and less than 1.13.8, and greater than or equal to 1.14.0 and less than 1.14.7, and greater than or equal to 1.15.0 and less than 1.15.4, and greater than or equal to 1.16.0 and less than 1.16.3, there is a cross-site scripting vulnerability in the Editor's LinkDialog plugin. This has been fixed in 1.11.11, 1.12.9, 1.13.8, 1.14.7, 1.15.4, 1.16.3."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/dojo/dijit/security/advisories/GHSA-cxjc-r2fp-7mq6",
"refsource": "CONFIRM",
"url": "https://github.com/dojo/dijit/security/advisories/GHSA-cxjc-r2fp-7mq6"
},
{
"name": "https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301",
"refsource": "MISC",
"url": "https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301"
},
{
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201023-0003/",
"url": "https://security.netapp.com/advisory/ntap-20201023-0003/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20230129 [SECURITY] [DLA 3289-1] dojo security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00030.html"
}
]
},
"source": {
"advisory": "GHSA-cxjc-r2fp-7mq6",
"discovery": "UNKNOWN"
}
}