CVE-2020-15273
Vulnerability from cvelistv5
Published
2020-10-30 19:10
Modified
2024-08-04 13:15
Severity ?
EPSS score ?
Summary
Cross-Site Scripting in baserCMS
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8 | Patch, Third Party Advisory | |
security-advisories@github.com | https://packagist.org/packages/baserproject/basercms | Third Party Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
baserproject | basercms |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:15:19.029Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://packagist.org/packages/baserproject/basercms" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "basercms", "vendor": "baserproject", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.4.1" } ] } ], "descriptions": [ { "lang": "en", "value": "baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. The issue affects the following components: Edit feed settings, Edit widget area, Sub site new registration, New category registration. Arbitrary JavaScript may be executed by entering specific characters in the account that can access the file upload function category list, subsite setting list, widget area edit, and feed list on the management screen. The issue was introduced in version 4.0.0. It is fixed in version 4.4.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-30T19:10:16", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8" }, { "tags": [ "x_refsource_MISC" ], "url": "https://packagist.org/packages/baserproject/basercms" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1" } ], "source": { "advisory": "GHSA-wpww-4jf4-4hx8", "discovery": "UNKNOWN" }, "title": "Cross-Site Scripting in baserCMS", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15273", "STATE": "PUBLIC", "TITLE": "Cross-Site Scripting in baserCMS" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "basercms", "version": { "version_data": [ { "version_value": "\u003e= 4.0.0, \u003c 4.4.1" } ] } } ] }, "vendor_name": "baserproject" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. The issue affects the following components: Edit feed settings, Edit widget area, Sub site new registration, New category registration. Arbitrary JavaScript may be executed by entering specific characters in the account that can access the file upload function category list, subsite setting list, widget area edit, and feed list on the management screen. The issue was introduced in version 4.0.0. It is fixed in version 4.4.1." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8", "refsource": "CONFIRM", "url": "https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8" }, { "name": "https://packagist.org/packages/baserproject/basercms", "refsource": "MISC", "url": "https://packagist.org/packages/baserproject/basercms" }, { "name": "https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1", "refsource": "MISC", "url": "https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1" } ] }, "source": { "advisory": "GHSA-wpww-4jf4-4hx8", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15273", "datePublished": "2020-10-30T19:10:16", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:15:19.029Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-15273\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2020-10-30T19:15:12.597\",\"lastModified\":\"2020-11-03T16:57:43.317\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. The issue affects the following components: Edit feed settings, Edit widget area, Sub site new registration, New category registration. Arbitrary JavaScript may be executed by entering specific characters in the account that can access the file upload function category list, subsite setting list, widget area edit, and feed list on the management screen. The issue was introduced in version 4.0.0. It is fixed in version 4.4.1.\"},{\"lang\":\"es\",\"value\":\"baserCMS anterior a la versi\u00f3n 4.4.1 es vulnerable a un ataque de tipo Cross-Site Scripting.\u0026#xa0;El problema afecta a los siguientes componentes: Edit feed settings, Edit widget area, Sub site new registration, New category registration.\u0026#xa0;Un JavaScript arbitrario puede ser ejecutado ingresando caracteres espec\u00edficos en la cuenta que puede acceder a la lista de categor\u00edas de funciones de carga de archivos, la lista subsite setting, la edici\u00f3n de widget area y la lista feed sobre la pantalla de administraci\u00f3n.\u0026#xa0;El problema se introdujo en la versi\u00f3n 4.0.0.\u0026#xa0;Est\u00e1 corregido en la versi\u00f3n 4.4.1\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.7,\"impactScore\":5.8},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.8}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":3.5},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.4.1\",\"matchCriteriaId\":\"BAB5F8EC-8396-41C0-8D37-10F8489CA598\"}]}]}],\"references\":[{\"url\":\"https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://packagist.org/packages/baserproject/basercms\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.