Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework.
References
Link | Resource |
---|---|
https://github.com/nette/application/security/advisories/GHSA-8gv3-3j7f-wg94 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/04/msg00003.html | Mailing List Third Party Advisory |
https://packagist.org/packages/nette/application | Third Party Advisory |
https://packagist.org/packages/nette/nette | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
18 Nov 2021, 16:47
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/04/msg00003.html - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | |
CWE | CWE-94 |
Information
Published : 2020-10-01 19:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-15227
Mitre link : CVE-2020-15227
CVE.ORG link : CVE-2020-15227
JSON object : View
Products Affected
debian
- debian_linux
nette
- application