fkie_cve-2020-12480
Vulnerability from fkie_nvd
Published
2020-08-17 21:15
Modified
2024-11-21 04:59
Severity ?
Summary
In Play Framework 2.6.0 through 2.8.1, the CSRF filter can be bypassed by making CORS simple requests with content types that contain parameters that can't be parsed.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
lightbend | play_framework | * | |
lightbend | play_framework | * | |
lightbend | play_framework | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lightbend:play_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC6CC562-3BD7-47FA-892A-7A6C5EF1CEE7", "versionEndIncluding": "2.6.25", "versionStartIncluding": "2.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:lightbend:play_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "67B6B90E-0049-4D6F-A9AE-C1BEF3A9B350", "versionEndIncluding": "2.7.4", "versionStartIncluding": "2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:lightbend:play_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "B480584D-B9A2-46ED-A7CD-61CD8051A234", "versionEndIncluding": "2.8.1", "versionStartIncluding": "2.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Play Framework 2.6.0 through 2.8.1, the CSRF filter can be bypassed by making CORS simple requests with content types that contain parameters that can\u0027t be parsed." }, { "lang": "es", "value": "En Play Framework versiones 2.6.0 hasta 2.8.1, el filtro CSRF puede ser omitido al hacer peticiones simples CORS con tipos de contenido que contienen par\u00e1metros que no pueden ser analizados." } ], "id": "CVE-2020-12480", "lastModified": "2024-11-21T04:59:47.240", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-08-17T21:15:11.523", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.playframework.com/security/vulnerability" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.playframework.com/security/vulnerability/CVE-2020-12480-CsrfBlacklistBypass" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.playframework.com/security/vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.playframework.com/security/vulnerability/CVE-2020-12480-CsrfBlacklistBypass" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…