{ "id": "CVE-2020-13407", "sourceIdentifier": "cve@mitre.org", "published": "2021-02-09T05:15:12.753", "lastModified": "2024-11-21T05:01:11.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tufin SecureTrack < R20-2 GA contains reflected + stored XSS (as in, the value is reflected back to the user, but is also stored within the DB and can be later triggered again by the same victim, or also later by different users). Both stored, and reflected payloads are triggerable by admin, so malicious non-authenticated user could get admin level access. Even malicious low-privileged user can inject XSS, which can be executed by admin, potentially elevating privileges and obtaining admin access. (issue 1 of 3)" }, { "lang": "es", "value": "Tufin SecureTrack versiones anteriores a R20-2 GA, contiene ataques de tipo XSS reflejado + almacenado (como en, el valor es reflejado de vuelta al usuario, pero tambi\u00e9n es almacenado dentro de la base de datos y puede ser activado nuevamente por la misma v\u00edctima, o tambi\u00e9n luego por diferentes usuarios) . El administrador puede activar tanto las cargas almacenadas como las reflejadas, por lo que un usuario malicioso no autenticado podr\u00eda conseguir acceso de nivel de administrador. Inclusive unos usuarios maliciosos pocos privilegiados pueden inyectar un ataque de tipo XSS, que puede ser ejecutado por un administrador, potencialmente elevando privilegios y consiguiendo acceso de administrador. (problema 1 de 3)" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 5.9, "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW" }, "exploitabilityScore": 1.7, "impactScore": 3.7 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:S/C:N/I:P/A:N", "baseScore": 2.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.4, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:tufin:securetrack:*:*:*:*:*:*:*:*", "versionEndExcluding": "r20-2", "matchCriteriaId": "EA134345-D356-476F-BFFA-E1578B17BBB7" } ] } ] } ], "references": [ { "url": "https://github.com/Accenture/AARO-Bugs/blob/master/AARO-CVE-List.md", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://github.com/Accenture/AARO-Bugs/blob/master/AARO-CVE-List.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] } ] }