GSD-2020-15227
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2020-15227",
"description": "Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework.",
"id": "GSD-2020-15227"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-15227"
],
"details": "Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework.",
"id": "GSD-2020-15227",
"modified": "2023-12-13T01:21:43.375708Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2020-15227",
"STATE": "PUBLIC",
"TITLE": "Remote Code Execution vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "application",
"version": {
"version_data": [
{
"version_value": "\u003e= 2.0.0, \u003c 2.0.19"
},
{
"version_value": "\u003e= 2.1.0, \u003c 2.1.13"
},
{
"version_value": "\u003e= 2.2.0, \u003c 2.2.10"
},
{
"version_value": "\u003e= 2.3.0, \u003c 2.3.14"
},
{
"version_value": "\u003e= 2.4.0, \u003c 2.4.16"
},
{
"version_value": "\u003e= 3.0.0, \u003c 3.0.6"
}
]
}
}
]
},
"vendor_name": "nette"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/nette/application/security/advisories/GHSA-8gv3-3j7f-wg94",
"refsource": "CONFIRM",
"url": "https://github.com/nette/application/security/advisories/GHSA-8gv3-3j7f-wg94"
},
{
"name": "https://packagist.org/packages/nette/application",
"refsource": "MISC",
"url": "https://packagist.org/packages/nette/application"
},
{
"name": "https://packagist.org/packages/nette/nette",
"refsource": "MISC",
"url": "https://packagist.org/packages/nette/nette"
},
{
"name": "[debian-lts-announce] 20210404 [SECURITY] [DLA 2617-1] php-nette security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00003.html"
}
]
},
"source": {
"advisory": "GHSA-8gv3-3j7f-wg94",
"discovery": "UNKNOWN"
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=2.0.0,\u003c2.0.19||\u003e=2.1.0,\u003c2.1.13||\u003e=2.2.0,\u003c2.2.10||\u003e=2.3.0,\u003c2.3.14||\u003e=2.4.0,\u003c2.4.16||\u003e=3.0.0,\u003c3.0.6",
"affected_versions": "All versions starting from 2.0.0 before 2.0.19, all versions starting from 2.1.0 before 2.1.13, all versions starting from 2.2.0 before 2.2.10, all versions starting from 2.3.0 before 2.3.14, all versions starting from 2.4.0 before 2.4.16, all versions starting from 3.0.0 before 3.0.6",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-937",
"CWE-94"
],
"date": "2021-11-18",
"description": "Nette are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a `PHP/Composer` MVC Framework.",
"fixed_versions": [
"2.2.10",
"2.3.14",
"2.4.16",
"3.0.6"
],
"identifier": "CVE-2020-15227",
"identifiers": [
"CVE-2020-15227",
"GHSA-8gv3-3j7f-wg94"
],
"not_impacted": "All versions before 2.0.0, all versions starting from 2.0.19 before 2.1.0, all versions starting from 2.1.13 before 2.2.0, all versions starting from 2.2.10 before 2.3.0, all versions starting from 2.3.14 before 2.4.0, all versions starting from 2.4.16 before 3.0.0, all versions starting from 3.0.6",
"package_slug": "packagist/nette/application",
"pubdate": "2020-10-01",
"solution": "Upgrade to versions 2.2.10, 2.3.14, 2.4.16, 3.0.6 or above.",
"title": "Injection Vulnerability",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2020-15227"
],
"uuid": "bed63ec0-db93-4cea-a42f-dc4e12317bef"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nette:application:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.0.19",
"versionStartIncluding": "2.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nette:application:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.1.13",
"versionStartIncluding": "2.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nette:application:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.2.10",
"versionStartIncluding": "2.2.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nette:application:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.3.14",
"versionStartIncluding": "2.3.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nette:application:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.4.16",
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nette:application:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.0.6",
"versionStartIncluding": "3.0.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2020-15227"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "N/A",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://packagist.org/packages/nette/application"
},
{
"name": "N/A",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://packagist.org/packages/nette/nette"
},
{
"name": "https://github.com/nette/application/security/advisories/GHSA-8gv3-3j7f-wg94",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/nette/application/security/advisories/GHSA-8gv3-3j7f-wg94"
},
{
"name": "[debian-lts-announce] 20210404 [SECURITY] [DLA 2617-1] php-nette security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00003.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-11-18T16:47Z",
"publishedDate": "2020-10-01T19:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…