CVE-2020-15951
 
Severity Score
6.1
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Immuta v2.8.2 accepts user-supplied project names without properly sanitizing the input, allowing attackers to inject arbitrary HTML content that is rendered as part of the application. An attacker could leverage this to redirect application users to a phishing website in an attempt to steal credentials.
Immuta versión v2.8.2, acepta nombres de proyectos suministrados por el usuario sin sanear apropiadamente la entrada, permitiendo a atacantes inyectar contenido HTML arbitrario que es renderizado como parte de la aplicación. Un atacante podría aprovechar esto para redireccionar a usuarios de la aplicación hacia un sitio web de phishing en un intento de robar credenciales
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2020-07-26 CVE Reserved
- 2020-11-05 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://labs.bishopfox.com/advisories/immuta-version-2.8.2 | Release Notes | |
https://www.immuta.com | Product |
URL | Date | SRC |
---|---|---|
https://labs.bishopfox.com/advisories | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|