{ "id": "CVE-2020-24897", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-29T20:15:16.353", "lastModified": "2020-09-04T16:53:39.633", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Table Filter and Charts for Confluence Server app before 5.3.25 (for Atlassian Confluence) allow remote attackers to inject arbitrary HTML or JavaScript via cross site scripting (XSS) through the provided Markdown markup to the \"Table from CSV\" macro." }, { "lang": "es", "value": "La aplicaci\u00f3n Table Filter y Charts para Confluence Server versiones anteriores a 5.3.25 (para Atlassian Confluence), permite a atacantes remotos inyectar HTML o JavaScript arbitrario por medio de un ataque de tipo cross site scripting (XSS) mediante el marcado Markdown proporcionado en la macro \"Table from CSV\"" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "LOW", "baseScore": 8.9, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.3, "impactScore": 6.0 }, { "source": "cve@mitre.org", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "LOW", "baseScore": 8.9, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.3, "impactScore": 6.0 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 3.5 }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:stiltsoft:table_filter_and_charts_for_confluence_server:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.3.25", "matchCriteriaId": "118B1C63-1585-4F75-ACD8-B4126C5BBFB2" } ] } ] } ], "references": [ { "url": "https://stiltsoft.atlassian.net/browse/VD-2", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] } ] }