Periscope BuySpeed version 14.5 is vulnerable to stored cross-site scripting, which could allow a local, authenticated attacker to store arbitrary JavaScript within the application. This JavaScript is subsequently displayed by the application without sanitization and is executed in the browser of the user, which could possibly cause website redirection, session hijacking, or information disclosure. This vulnerability has been patched in BuySpeed version 15.3.
References
Link | Resource |
---|---|
https://kb.cert.org/vuls/id/660597/ | Third Party Advisory US Government Resource |
https://support.buyspeed.com/hc/en-us/articles/360035773831-Buyspeed-15-3-0-Release-Notes | Release Notes Vendor Advisory |
https://kb.cert.org/vuls/id/660597/ | Third Party Advisory US Government Resource |
https://support.buyspeed.com/hc/en-us/articles/360035773831-Buyspeed-15-3-0-Release-Notes | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 05:39
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 3.9 |
References | () https://kb.cert.org/vuls/id/660597/ - Third Party Advisory, US Government Resource | |
References | () https://support.buyspeed.com/hc/en-us/articles/360035773831-Buyspeed-15-3-0-Release-Notes - Release Notes, Vendor Advisory |
Information
Published : 2020-04-10 19:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-9056
Mitre link : CVE-2020-9056
CVE.ORG link : CVE-2020-9056
JSON object : View
Products Affected
periscopeholdings
- buyspeed
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')