cve-2020-9743
Vulnerability from cvelistv5
Published
2020-09-10 16:36
Modified
2024-09-16 18:28
Severity ?
EPSS score ?
Summary
HTML injection in AEM's content editor component
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | https://helpx.adobe.com/security/products/experience-manager/apsb20-56.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Experience Manager |
Version: unspecified < Version: unspecified < Version: unspecified < Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:43:04.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/experience-manager/apsb20-56.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Experience Manager", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "6.5.5.0", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "6.4.8.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "6.3.3.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "6.2 SP1-CFP20", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-09-08T00:00:00", "descriptions": [ { "lang": "en", "value": "AEM versions 6.5.5.0 (and below), 6.4.8.1 (and below), 6.3.3.8 (and below) and 6.2 SP1-CFP20 (and below) are affected by an HTML injection vulnerability in the content editor component that allows unauthenticated users to craft an HTTP request that includes arbitrary HTML code in a parameter value. An attacker could then use the malicious GET request to lure victims to perform unsafe actions in the page (ex. phishing)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation (CWE-20)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-10T16:36:06", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/experience-manager/apsb20-56.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "HTML injection in AEM\u0027s content editor component", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2020-09-08T23:00:00.000Z", "ID": "CVE-2020-9743", "STATE": "PUBLIC", "TITLE": "HTML injection in AEM\u0027s content editor component" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Experience Manager", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "6.5.5.0" }, { "version_affected": "\u003c=", "version_value": "6.4.8.1" }, { "version_affected": "\u003c=", "version_value": "6.3.3.8" }, { "version_affected": "\u003c=", "version_value": "6.2 SP1-CFP20" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AEM versions 6.5.5.0 (and below), 6.4.8.1 (and below), 6.3.3.8 (and below) and 6.2 SP1-CFP20 (and below) are affected by an HTML injection vulnerability in the content editor component that allows unauthenticated users to craft an HTTP request that includes arbitrary HTML code in a parameter value. An attacker could then use the malicious GET request to lure victims to perform unsafe actions in the page (ex. phishing)." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Network", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "None", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation (CWE-20)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/experience-manager/apsb20-56.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/experience-manager/apsb20-56.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2020-9743", "datePublished": "2020-09-10T16:36:06.556142Z", "dateReserved": "2020-03-02T00:00:00", "dateUpdated": "2024-09-16T18:28:22.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-9743\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2020-09-10T17:15:41.377\",\"lastModified\":\"2021-09-14T17:30:03.687\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"AEM versions 6.5.5.0 (and below), 6.4.8.1 (and below), 6.3.3.8 (and below) and 6.2 SP1-CFP20 (and below) are affected by an HTML injection vulnerability in the content editor component that allows unauthenticated users to craft an HTTP request that includes arbitrary HTML code in a parameter value. An attacker could then use the malicious GET request to lure victims to perform unsafe actions in the page (ex. phishing).\"},{\"lang\":\"es\",\"value\":\"AEM versiones 6.5.5.0 (y anteriores), 6.4.8.1 (y anteriores), 6.3.3.8 (y anteriores) y 6.2 SP1-CFP20 (y posteriores), est\u00e1n afectadas por una vulnerabilidad de inyecci\u00f3n HTML en el componente content editor que permite a usuarios no autenticados dise\u00f1ar una petici\u00f3n HTTP que incluya c\u00f3digo HTML arbitrario en un valor de par\u00e1metro. Un atacante podr\u00eda utilizar la petici\u00f3n GET maliciosa para atraer a las v\u00edctimas a llevar a cabo acciones no seguras en la p\u00e1gina (por ejemplo, phishing)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7},{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.3.0.0\",\"versionEndIncluding\":\"6.3.3.8\",\"matchCriteriaId\":\"F61E8D62-4FB7-48E0-A750-C3F6EBE5F613\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.4.0.0\",\"versionEndIncluding\":\"6.4.8.1\",\"matchCriteriaId\":\"0482E99D-21DC-489C-8E0B-707A70A48FC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5.0.0\",\"versionEndIncluding\":\"6.5.5.0\",\"matchCriteriaId\":\"C9D06479-83AE-4F9A-BAE9-7849798F1A30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE7DD1A2-EB34-4862-878F-0768D91ED375\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3E28FB2-DD09-471E-A846-45D00A1DEAE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp10:*:*:*:*:*:*\",\"matchCriteriaId\":\"1537FAD0-6B8C-440E-ADBE-6E55B5E95545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp11:*:*:*:*:*:*\",\"matchCriteriaId\":\"80CD82AA-BD51-44ED-843D-155E0253A9EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp12.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F50647B-FD1C-43E4-A688-F9B4ED244028\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp13:*:*:*:*:*:*\",\"matchCriteriaId\":\"A97165F4-F357-4271-A141-4091973F9A34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp14:*:*:*:*:*:*\",\"matchCriteriaId\":\"92D76A04-0B29-4BF2-B016-7FA82B12FE53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp15:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C555A79-F619-4119-9DEA-0679059F6111\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp16:*:*:*:*:*:*\",\"matchCriteriaId\":\"9732E3D9-15A3-4571-8B40-88B7FF64D994\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp17:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2DB2AFF-4C6D-4CFD-8BCD-6ED5FABF677C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp18:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D72D08D-3B08-4FA9-A5D8-1709229CCAA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp19:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CEA0E51-6982-4F18-A7BC-500C341E415E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A531C028-FED4-473E-BB08-E4D92C3AE5F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp20:*:*:*:*:*:*\",\"matchCriteriaId\":\"880D18CA-1FF0-436D-91C0-E29C85C4AD8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8871723-95D7-4A4A-A232-A7CE7F5EE020\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C22A756-74DB-4D4F-9B32-00D85F127260\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp5:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EBDA638-4C8A-438F-96E2-B5EAA2B21DCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp6:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A457620-A285-4F7F-8FA7-3F0C514E4658\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp7:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BA4E1EE-C90A-4028-8DBC-47F6DF90021E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp8:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD076F63-6F46-4852-9080-1AD72B5001F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp9:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D75869C-D57A-480B-941A-8679EABAE593\"}]}]}],\"references\":[{\"url\":\"https://helpx.adobe.com/security/products/experience-manager/apsb20-56.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.