Show plain JSON{"id": "CVE-2020-26251", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 4.7, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 1.6}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 4.7, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 1.6}]}, "published": "2020-12-18T18:15:12.543", "references": [{"url": "https://github.com/open-zaak/open-zaak/blob/master/CHANGELOG.rst#133-2020-12-17", "tags": ["Release Notes", "Third Party Advisory"], "source": "security-advisories@github.com"}, {"url": "https://github.com/open-zaak/open-zaak/commit/952269269f1b629fce9c94485f83ac13f31d6c46", "tags": ["Patch", "Third Party Advisory"], "source": "security-advisories@github.com"}, {"url": "https://github.com/open-zaak/open-zaak/security/advisories/GHSA-chhr-gxrg-64x7", "tags": ["Third Party Advisory"], "source": "security-advisories@github.com"}, {"url": "https://github.com/open-zaak/open-zaak/blob/master/CHANGELOG.rst#133-2020-12-17", "tags": ["Release Notes", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/open-zaak/open-zaak/commit/952269269f1b629fce9c94485f83ac13f31d6c46", "tags": ["Patch", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/open-zaak/open-zaak/security/advisories/GHSA-chhr-gxrg-64x7", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-346"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-346"}]}], "descriptions": [{"lang": "en", "value": "Open Zaak is a modern, open-source data- and services-layer to enable zaakgericht werken, a Dutch approach to case management. In Open Zaak before version 1.3.3 the Cross-Origin-Resource-Sharing policy in Open Zaak is currently wide open - every client is allowed. This allows evil.com to run scripts that perform AJAX calls to known Open Zaak installations, and the browser will not block these. This was intended to only apply to development machines running on localhost/127.0.0.1. Open Zaak 1.3.3 disables CORS by default, while it can be opted-in through environment variables. The vulnerability does not actually seem exploitable because: a) The session cookie has a `Same-Site: Lax` policy which prevents it from being sent along in Cross-Origin requests. b) All pages that give access to (production) data are login-protected c) `Access-Control-Allow-Credentials` is set to `false` d) CSRF checks probably block the remote origin, since they're not explicitly added to the trusted allowlist."}, {"lang": "es", "value": "Open Zaak es una capa moderna de datos y servicios de c\u00f3digo abierto que habilita a zaakgericht werken, un enfoque Dutch para la gesti\u00f3n de casos. En Open Zaak anterior a la versi\u00f3n 1.3.3, la pol\u00edtica Cross-Origin-Resource-Sharing en Open Zaak est\u00e1 actualmente abierta: todos los clientes est\u00e1n autorizados. Esto permite que evil.com ejecutar scripts que realicen llamadas AJAX a instalaciones conocidas de Open Zaak, y el navegador no las bloquear\u00e1. Esto estaba destinado a ser aplicado solo a las m\u00e1quinas de desarrollo que se ejecutan en localhost/127.0.0.1. Open Zaak versi\u00f3n 1.3.3 deshabilita a CORS por defecto, mientras que se puede habilitar por medio de variables de entorno. En realidad, la vulnerabilidad no parece explotable porque: a) La cookie de sesi\u00f3n tiene una pol\u00edtica \"Same-Site: Lax\" que impide que se env\u00ede en peticiones de origen cruzado. b) Todas las p\u00e1ginas que dan acceso a los datos (de producci\u00f3n) est\u00e1n protegidas por inicio de sesi\u00f3n c) \"Access-Control-Allow-Credentials\" se establece en \"false\" d) Las comprobaciones de CSRF probablemente bloquean el origen remoto, ya que no se agregan expl\u00edcitamente a la lista de permitidos de confianza"}], "lastModified": "2024-11-21T05:19:39.693", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:openzaak:open_zaak:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2EC50EF3-3341-4DA3-83C7-88272FC139CB", "versionEndExcluding": "1.3.3"}], "operator": "OR"}]}], "sourceIdentifier": "security-advisories@github.com"}