CVE-2020-4126
Vulnerability from cvelistv5
Published
2020-11-30 23:50
Modified
2024-08-04 07:52
Severity ?
EPSS score ?
Summary
HCL iNotes is susceptible to a sensitive cookie exposure vulnerability. This can allow an unauthenticated remote attacker to capture the cookie by intercepting its transmission within an http session. Fixes are available in HCL Domino and iNotes versions 10.0.1 FP6 and 11.0.1 FP2 and later.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | HCL iNotes |
Version: v10.0.1 FP6, v11.0.1 FP2 and later |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.918Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0085411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HCL iNotes", "vendor": "n/a", "versions": [ { "status": "affected", "version": "v10.0.1 FP6, v11.0.1 FP2 and later" } ] } ], "descriptions": [ { "lang": "en", "value": "HCL iNotes is susceptible to a sensitive cookie exposure vulnerability. This can allow an unauthenticated remote attacker to capture the cookie by intercepting its transmission within an http session. Fixes are available in HCL Domino and iNotes versions 10.0.1 FP6 and 11.0.1 FP2 and later." } ], "problemTypes": [ { "descriptions": [ { "description": "Sensitive cookie exposure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-30T23:50:09", "orgId": "1e47fe04-f25f-42fa-b674-36de2c5e3cfc", "shortName": "HCL" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0085411" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@hcl.com", "ID": "CVE-2020-4126", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HCL iNotes", "version": { "version_data": [ { "version_value": "v10.0.1 FP6, v11.0.1 FP2 and later" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HCL iNotes is susceptible to a sensitive cookie exposure vulnerability. This can allow an unauthenticated remote attacker to capture the cookie by intercepting its transmission within an http session. Fixes are available in HCL Domino and iNotes versions 10.0.1 FP6 and 11.0.1 FP2 and later." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Sensitive cookie exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0085411", "refsource": "MISC", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0085411" } ] } } } }, "cveMetadata": { "assignerOrgId": "1e47fe04-f25f-42fa-b674-36de2c5e3cfc", "assignerShortName": "HCL", "cveId": "CVE-2020-4126", "datePublished": "2020-11-30T23:50:09", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.918Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-4126\",\"sourceIdentifier\":\"psirt@hcl.com\",\"published\":\"2020-12-01T00:15:11.197\",\"lastModified\":\"2024-11-21T05:32:17.890\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"HCL iNotes is susceptible to a sensitive cookie exposure vulnerability. This can allow an unauthenticated remote attacker to capture the cookie by intercepting its transmission within an http session. Fixes are available in HCL Domino and iNotes versions 10.0.1 FP6 and 11.0.1 FP2 and later.\"},{\"lang\":\"es\",\"value\":\"HCL iNotes es susceptible a una vulnerabilidad de exposici\u00f3n de cookies confidenciales. Esto puede permitir a un atacante remoto no autenticado capturar la cookie interceptando su transmisi\u00f3n dentro de una sesi\u00f3n http. Las correcciones est\u00e1n disponibles en HCL Domino e iNotes versiones 10.0.1 FP6 y 11.0.1 FP2 y posteriores\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-311\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hcltech:hcl_inotes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0\",\"versionEndExcluding\":\"10.0.1\",\"matchCriteriaId\":\"281A8ED6-2F9B-493E-9E5B-E2CF8CAADE86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hcltech:hcl_inotes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndExcluding\":\"11.0.1\",\"matchCriteriaId\":\"83B10D1E-A272-48A7-AB91-12CE7B909B6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hcltech:hcl_inotes:10.0.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DB5111E-B70F-475F-A23D-DF08FD1AB97E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AA0BE4B-C5B2-4F0A-AE23-25032CC7C2E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE8447C7-B040-461A-88AD-C407A3867928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack3:*:*:*:*:*:*\",\"matchCriteriaId\":\"080E290A-A18E-45A6-9039-369763AC27CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack4:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE08595A-7384-4DED-854F-B28C4C431FEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack5:*:*:*:*:*:*\",\"matchCriteriaId\":\"3971CAAD-A1A2-4EE9-9BC9-A7108E3B671C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hcltech:hcl_inotes:11.0.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"2433DEDD-8650-4B01-85B9-92F5D1446030\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack1:*:*:*:*:*:*\",\"matchCriteriaId\":\"582BCD88-43F2-4E10-B638-4C1D54ED71F8\"}]}]}],\"references\":[{\"url\":\"https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0085411\",\"source\":\"psirt@hcl.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0085411\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.