2024-12-08 03:06:42 +00:00

122 lines
3.9 KiB
JSON

{
"id": "CVE-2020-13652",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-06-15T19:15:10.107",
"lastModified": "2024-11-21T05:01:41.053",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in DigDash 2018R2 before p20200528, 2019R1 before p20200528, 2019R2 before p20200430, and 2020R1 before p20200507. A cross-site scripting (XSS) vulnerability exists in the login menu."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en DigDash versiones 2018R2 anteriores a p20200528, versiones 2019R1 anteriores a p20200421 y versiones 2019R2 anteriores a p20200430. Permite al usuario proporcionar datos que se utilizar\u00e1n para generar el archivo JNLP utilizado por un cliente para obtener la aplicaci\u00f3n Java correcta. Al proporcionar una URL controlada por el atacante, el cliente obtendr\u00e1 un archivo JNLP falso que especifica la instalaci\u00f3n de archivos JAR maliciosos y se ejecutar\u00e1 con todos los privilegios en la computadora del cliente"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digdash:digdash:2018r2:*:*:*:*:*:*:*",
"matchCriteriaId": "6A520A09-9D05-4CF8-88D2-77BD62C47AEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digdash:digdash:2019r1:*:*:*:*:*:*:*",
"matchCriteriaId": "D4EA7414-EE5A-4ACE-A386-E97EA10534A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digdash:digdash:2019r2:*:*:*:*:*:*:*",
"matchCriteriaId": "1EF8CA72-BF41-4543-9F1C-1B0FF088EECE"
}
]
}
]
}
],
"references": [
{
"url": "https://know.bishopfox.com/advisories/digdash-version-2018",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://know.bishopfox.com/advisories/digdash-version-2018",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}