2024-12-08 03:06:42 +00:00

113 lines
3.8 KiB
JSON

{
"id": "CVE-2020-9758",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-03-09T19:15:15.880",
"lastModified": "2024-11-21T05:41:13.733",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in chat.php in LiveZilla Live Chat 8.0.1.3 (Helpdesk). A blind JavaScript injection lies in the name parameter. Triggering this can fetch the username and passwords of the helpdesk employees in the URI. This leads to a privilege escalation, from unauthenticated to user-level access, leading to full account takeover. The attack fetches multiple credentials because they are stored in the database (stored XSS). This affects the mobile/chat URI via the lgn and psswrd parameters."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en el archivo chat.php en LiveZilla Live Chat versi\u00f3n 8.0.1.3 (Helpdesk). Una inyecci\u00f3n JavaScript ciega se encuentra en el par\u00e1metro name. Desencadenar esto puede extraer el nombre de usuario y las contrase\u00f1as de los empleados del servicio de asistencia en el URI. Esto conlleva a una escalada de privilegios, desde el acceso no autenticado hasta el nivel de usuario, conllevando a la toma de control total de la cuenta. El ataque extrae m\u00faltiples credenciales porque est\u00e1n almacenadas en la base de datos (XSS almacenado). Esto afecta el URI mobile/chat por medio de los par\u00e1metros lgn y psswrd."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:livezilla:livezilla:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.0.1.3",
"matchCriteriaId": "81210B50-7951-4BB5-9E5B-2A02401A2EA1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ari034/CVE-2020-9758",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/ari034/CVE-2020-9758",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}