NN-2020:3-01
Vulnerability from csaf_nozominetworks
Published
2020-05-26 11:00
Modified
2024-05-20 11:00
Summary
Angular template injection on custom report name field

Notes

Risk Level for Nozomi customers
Low



{
   document: {
      aggregate_severity: {
         text: "MEDIUM",
      },
      category: "csaf_vex",
      csaf_version: "2.0",
      distribution: {
         tlp: {
            label: "WHITE",
         },
      },
      lang: "en-US",
      notes: [
         {
            category: "other",
            text: "Low",
            title: "Risk Level for Nozomi customers",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "Nozomi Networks Product Security team can be reached at prodsec@nozominetworks.com",
         name: "Nozomi Networks Product Security",
         namespace: "https://security.nozominetworks.com/psirt",
      },
      title: "Angular template injection on custom report name field",
      tracking: {
         current_release_date: "2024-05-20T11:00:00.000Z",
         id: "NN-2020:3-01",
         initial_release_date: "2020-05-26T11:00:00.000Z",
         revision_history: [
            {
               date: "2020-05-26T11:00:00.000Z",
               number: "1",
               summary: "Initial revision",
            },
            {
               date: "2023-09-04T11:00:00.000Z",
               number: "2",
               summary: "Minor updates to format and metadata to improve the CSAF implementation",
            },
            {
               date: "2023-11-13T11:00:00.000Z",
               number: "3",
               summary: "Migrated to CSAF VEX format",
            },
            {
               date: "2023-11-16T11:00:00.000Z",
               number: "4",
               summary: "CSAF vers improvements",
            },
            {
               date: "2024-05-20T11:00:00.000Z",
               number: "5",
               summary: "Added CVSS v4.0 scoring where applicable",
            },
         ],
         status: "final",
         version: "5",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version_range",
                        name: "vers:gem/<19.0.11",
                        product: {
                           name: "Nozomi Networks Guardian <19.0.11",
                           product_id: "CSAFPID-0001",
                        },
                     },
                     {
                        category: "product_version_range",
                        name: "vers:gem/>=20.0.0|<20.0.3",
                        product: {
                           name: "Nozomi Networks Guardian >=20.0.0|<20.0.3",
                           product_id: "CSAFPID-0002",
                        },
                     },
                     {
                        category: "product_version",
                        name: "19.0.11",
                        product: {
                           name: "Nozomi Networks Guardian 19.0.11",
                           product_id: "CSAFPID-0003",
                        },
                     },
                     {
                        category: "product_version",
                        name: "20.0.3",
                        product: {
                           name: "Nozomi Networks Guardian 20.0.3",
                           product_id: "CSAFPID-0004",
                        },
                     },
                  ],
                  category: "product_name",
                  name: "Guardian",
               },
               {
                  branches: [
                     {
                        category: "product_version_range",
                        name: "vers:gem/<19.0.11",
                        product: {
                           name: "Nozomi Networks CMC <19.0.11",
                           product_id: "CSAFPID-0005",
                        },
                     },
                     {
                        category: "product_version_range",
                        name: "vers:gem/>=20.0.0|<20.0.3",
                        product: {
                           name: "Nozomi Networks CMC >=20.0.0|<20.0.3",
                           product_id: "CSAFPID-0006",
                        },
                     },
                     {
                        category: "product_version",
                        name: "19.0.11",
                        product: {
                           name: "Nozomi Networks CMC 19.0.11",
                           product_id: "CSAFPID-0007",
                        },
                     },
                     {
                        category: "product_version",
                        name: "20.0.3",
                        product: {
                           name: "Nozomi Networks CMC 20.0.3",
                           product_id: "CSAFPID-0008",
                        },
                     },
                  ],
                  category: "product_name",
                  name: "CMC",
               },
            ],
            category: "vendor",
            name: "Nozomi Networks",
         },
      ],
   },
   vulnerabilities: [
      {
         acknowledgments: [
            {
               organization: "Schneider Electric Industry Services",
               summary: "finding this bug",
            },
         ],
         cwe: {
            id: "CWE-79",
            name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
         },
         discovery_date: "2020-05-26T11:00:00.000Z",
         ids: [
            {
               system_name: "Nozomi Networks Security Advisory ID",
               text: "NN-2020:3-01",
            },
         ],
         notes: [
            {
               category: "summary",
               text: "Report name field is affected by angular template injection which can lead to XSS attacks.",
               title: "Vulnerability summary",
            },
         ],
         product_status: {
            fixed: [
               "CSAFPID-0003",
               "CSAFPID-0004",
               "CSAFPID-0007",
               "CSAFPID-0008",
            ],
            known_affected: [
               "CSAFPID-0001",
               "CSAFPID-0002",
               "CSAFPID-0005",
               "CSAFPID-0006",
            ],
         },
         remediations: [
            {
               category: "mitigation",
               details: "None",
               product_ids: [
                  "CSAFPID-0001",
                  "CSAFPID-0002",
                  "CSAFPID-0005",
                  "CSAFPID-0006",
               ],
            },
            {
               category: "vendor_fix",
               details: "v19 series: Upgrade to v19.0.11 v20 series: Upgrade to v20.0.3",
               product_ids: [
                  "CSAFPID-0001",
                  "CSAFPID-0002",
                  "CSAFPID-0005",
                  "CSAFPID-0006",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.8,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-0001",
                  "CSAFPID-0002",
                  "CSAFPID-0005",
                  "CSAFPID-0006",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Custom report name field can lead to XSS attacks by malicious users. The attacker must have a valid Guardian/CMC login with the ‘Report editor’ capability to leverage this.",
            },
         ],
         title: "Angular template injection on custom report name field",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.