2024-12-08 03:06:42 +00:00

129 lines
3.9 KiB
JSON

{
"id": "CVE-2020-13697",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-02-23T08:15:11.307",
"lastModified": "2024-11-21T05:01:45.733",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in RouterNanoHTTPD.java in NanoHTTPD through 2.3.1. The GeneralHandler class implements a basic GET handler that prints debug information as an HTML page. Any web server that extends this class without implementing its own GET handler is vulnerable to reflected XSS, because the GeneralHandler GET handler prints user input passed through the query string without any sanitization."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en el archivo RouterNanoHTTPD.java en NanoHTTPD versiones hasta 2.3.1. La clase GeneralHandler implementa un manejador GET b\u00e1sico que imprime informaci\u00f3n de depuraci\u00f3n como una p\u00e1gina HTML. Cualquier servidor web que extienda esta clase sin implementar su propio manejador GET es vulnerable al ataque de tipo XSS reflejado, porque el manejador GET GeneralHandler imprime la entrada del usuario pasada por medio de la cadena de consulta sin ning\u00fan tipo de saneo"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nanohttpd:nanohttpd:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.3.1",
"matchCriteriaId": "6DB794C4-3984-437E-8366-5693A399470B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/NanoHttpd/nanohttpd",
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
]
},
{
"url": "https://www.vdoo.com/advisories",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/NanoHttpd/nanohttpd",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
]
},
{
"url": "https://www.vdoo.com/advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}