126 lines
3.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2020-25890",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-11-17T21:15:12.363",
"lastModified": "2024-11-21T05:18:58.537",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "The web application of Kyocera printer (ECOSYS M2640IDW) is affected by Stored XSS vulnerability, discovered in the addition a new contact in \"Machine Address Book\". Successful exploitation of this vulnerability can lead to session hijacking of the administrator in the web application or the execution of unwanted actions"
},
{
"lang": "es",
"value": "La aplicaci\u00f3n web de la impresora Kyocera (ECOSYS M2640IDW) est\u00e1 afectada por una vulnerabilidad de tipo XSS almacenado, descubr\u00eda adem\u00e1s un nuevo contacto en \"Machine Address Book\". Una explotaci\u00f3n con \u00e9xito de esta vulnerabilidad puede conllevar al secuestro de la sesi\u00f3n de administrador en la aplicaci\u00f3n web o la ejecuci\u00f3n de acciones no deseadas"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
2023-04-24 12:24:31 +02:00
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
2023-04-24 12:24:31 +02:00
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kyocera:ecosys_m2640idw_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19244E64-62DD-496E-BC2C-55F7F9354551"
2023-04-24 12:24:31 +02:00
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:kyocera:ecosys_m2640idw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D7A0AA1-DA3D-4A1D-994F-2E56C81B62F0"
2023-04-24 12:24:31 +02:00
}
]
}
]
}
],
"references": [
{
"url": "https://vitor-santos.medium.com/xss-in-kyocera-printer-ecosys-m2640idw-cf6d3bc525e3",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vitor-santos.medium.com/xss-in-kyocera-printer-ecosys-m2640idw-cf6d3bc525e3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}