Show plain JSON{"id": "CVE-2020-26583", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 6.1, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 2.8}]}, "published": "2020-10-16T06:15:12.417", "references": [{"url": "https://sec-consult.com/en/vulnerability-lab/advisories/", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://seclists.org/fulldisclosure/2020/Oct/17", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.sagedpw.at", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://sec-consult.com/en/vulnerability-lab/advisories/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://seclists.org/fulldisclosure/2020/Oct/17", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.sagedpw.at", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-434"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in Sage DPW 2020_06_x before 2020_06_002. It allows unauthenticated users to upload JavaScript (in a file) via the expenses claiming functionality. However, to view the file, authentication is required. By exploiting this vulnerability, an attacker can persistently include arbitrary HTML or JavaScript code into the affected web page. The vulnerability can be used to change the contents of the displayed site, redirect to other sites, or steal user credentials. Additionally, users are potential victims of browser exploits and JavaScript malware."}, {"lang": "es", "value": "Se detect\u00f3 un problema en Sage DPW versiones 2020_06_x anteriores a 2020_06_002. Permite a usuarios no autenticados cargar JavaScript (en un archivo) por medio de la funcionalidad expenses claiming. Sin embargo, es requerida una autenticaci\u00f3n para visualizar el archivo. Al explotar esta vulnerabilidad, un atacante puede incluir de forma persistente c\u00f3digo HTML o JavaScript arbitrario en la p\u00e1gina web afectada. La vulnerabilidad puede ser usada para cambiar el contenido del sitio mostrado, redireccionar a otros sitios o robar credenciales de usuario. Adem\u00e1s, los usuarios son v\u00edctimas potenciales de explotaciones del navegador y malware en JavaScript"}], "lastModified": "2024-11-21T05:20:07.157", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:sagedpw:sage_dpw:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0C28A67-3ED8-42EC-8AA4-E63D9C0741EF", "versionEndExcluding": "2020_06_002", "versionStartIncluding": "2020_06_000"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}