CVE-2020-13183 (GCVE-0-2020-13183)
Vulnerability from cvelistv5
Published
2020-08-17 20:31
Modified
2024-08-04 12:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Reflected Cross Site Scripting
Summary
Reflected Cross Site Scripting in Teradici PCoIP Management Console prior to 20.07 could allow an attacker to take over the user's active session if the user is exposed to a malicious payload.
References
► | URL | Tags | |
---|---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Teradici PCoIP Management Console |
Version: Before 20.07 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:19.444Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisory.teradici.com/security-advisories/63/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Teradici PCoIP Management Console", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Before 20.07" } ] } ], "descriptions": [ { "lang": "en", "value": "Reflected Cross Site Scripting in Teradici PCoIP Management Console prior to 20.07 could allow an attacker to take over the user\u0027s active session if the user is exposed to a malicious payload." } ], "problemTypes": [ { "descriptions": [ { "description": "Reflected Cross Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-17T20:31:06", "orgId": "ba3c294d-a544-4fff-ad44-2de7c7bbb6be", "shortName": "Teradici" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisory.teradici.com/security-advisories/63/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@teradici.com", "ID": "CVE-2020-13183", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Teradici PCoIP Management Console", "version": { "version_data": [ { "version_value": "Before 20.07" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Reflected Cross Site Scripting in Teradici PCoIP Management Console prior to 20.07 could allow an attacker to take over the user\u0027s active session if the user is exposed to a malicious payload." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Reflected Cross Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisory.teradici.com/security-advisories/63/", "refsource": "MISC", "url": "https://advisory.teradici.com/security-advisories/63/" } ] } } } }, "cveMetadata": { "assignerOrgId": "ba3c294d-a544-4fff-ad44-2de7c7bbb6be", "assignerShortName": "Teradici", "cveId": "CVE-2020-13183", "datePublished": "2020-08-17T20:31:06", "dateReserved": "2020-05-19T00:00:00", "dateUpdated": "2024-08-04T12:11:19.444Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-13183\",\"sourceIdentifier\":\"security@teradici.com\",\"published\":\"2020-08-17T21:15:11.587\",\"lastModified\":\"2024-11-21T05:00:49.037\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Reflected Cross Site Scripting in Teradici PCoIP Management Console prior to 20.07 could allow an attacker to take over the user\u0027s active session if the user is exposed to a malicious payload.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de tipo Cross Site Scripting Reflejado en Teradici PCoIP Management Console versiones anteriores a 20.07, podr\u00edan permitir a un atacante tomar el control de la sesi\u00f3n activa del usuario si el usuario est\u00e1 expuesto a una carga \u00fatil maliciosa.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:teradici:pcoip_management_console:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"20.07\",\"matchCriteriaId\":\"7A91B2BB-99F8-47C8-AFDA-38A9134957F2\"}]}]}],\"references\":[{\"url\":\"https://advisory.teradici.com/security-advisories/63/\",\"source\":\"security@teradici.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://advisory.teradici.com/security-advisories/63/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…