Show plain JSON{"id": "CVE-2020-28927", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 6.1, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 2.8}]}, "published": "2020-11-23T20:15:12.900", "references": [{"url": "https://akshayj0111.medium.com/cve-2020-28927-6f64c25239bb", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://magicpin.in", "tags": ["Product"], "source": "cve@mitre.org"}, {"url": "https://akshayj0111.medium.com/cve-2020-28927-6f64c25239bb", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://magicpin.in", "tags": ["Product"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "There is a Stored XSS in Magicpin v2.1 in the User Registration section. Each time an admin visits the manage user section from the admin panel, the XSS triggers and the attacker can able to steal the cookie according to the crafted payload."}, {"lang": "es", "value": "Se presenta una vulnerabilidad de tipo XSS almacenado en Magicpin versi\u00f3n v2.1 en la secci\u00f3n User Registration. Cada vez que un administrador visita la secci\u00f3n manage user desde el panel de administraci\u00f3n, el XSS se activa y el atacante puede robar la cookie de acuerdo con la carga \u00fatil dise\u00f1ada"}], "lastModified": "2024-11-21T05:23:18.740", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:magicpin:magicpin:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5F96F1F-58C3-4480-A118-E2D407BADA78"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}