2024-11-23 13:10:58 +00:00

159 lines
5.0 KiB
JSON

{
"id": "CVE-2020-9056",
"sourceIdentifier": "cret@cert.org",
"published": "2020-04-10T19:15:13.617",
"lastModified": "2024-11-21T05:39:55.443",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Periscope BuySpeed version 14.5 is vulnerable to stored cross-site scripting, which could allow a local, authenticated attacker to store arbitrary JavaScript within the application. This JavaScript is subsequently displayed by the application without sanitization and is executed in the browser of the user, which could possibly cause website redirection, session hijacking, or information disclosure. This vulnerability has been patched in BuySpeed version 15.3."
},
{
"lang": "es",
"value": "Periscope BuySpeed versi\u00f3n 14.5, ??es vulnerable a un ataque de tipo cross-site scripting almacenado, el cual podr\u00eda permitir a un atacante local autenticado almacenar JavaScript arbitrario dentro de la aplicaci\u00f3n. Este JavaScript es posteriormente mostrado por la aplicaci\u00f3n sin sanear y es ejecutado en el navegador del usuario, lo que posiblemente podr\u00eda causar un redireccionamiento abierto del sitio web, secuestro de la sesi\u00f3n o una divulgaci\u00f3n de informaci\u00f3n. Esta vulnerabilidad ha sido parcheada en BuySpeed ??versi\u00f3n 15.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cret@cert.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
"baseScore": 3.9,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.3,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"baseScore": 3.5,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "cret@cert.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:periscopeholdings:buyspeed:14.5:*:*:*:*:*:*:*",
"matchCriteriaId": "58C95CA6-C269-4D9F-9B7E-2D88BADEBEBC"
}
]
}
]
}
],
"references": [
{
"url": "https://kb.cert.org/vuls/id/660597/",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://support.buyspeed.com/hc/en-us/articles/360035773831-Buyspeed-15-3-0-Release-Notes",
"source": "cret@cert.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://kb.cert.org/vuls/id/660597/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://support.buyspeed.com/hc/en-us/articles/360035773831-Buyspeed-15-3-0-Release-Notes",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}