cve-2020-11711
Vulnerability from cvelistv5
Published
2023-08-25 00:00
Modified
2024-10-02 18:12
Severity ?
EPSS score ?
Summary
An issue was discovered in Stormshield SNS 3.8.0. Authenticated Stored XSS in the admin login panel leads to SSL VPN credential theft. A malicious disclaimer file can be uploaded from the admin panel. The resulting file is rendered on the authentication interface of the admin panel. It is possible to inject malicious HTML content in order to execute JavaScript inside a victim's browser. This results in a stored XSS on the authentication interface of the admin panel. Moreover, an unsecured authentication form is present on the authentication interface of the SSL VPN captive portal. Users are allowed to save their credentials inside the browser. If an administrator saves his credentials through this unsecured form, these credentials could be stolen via the stored XSS on the admin panel without user interaction. Another possible exploitation would be modification of the authentication form of the admin panel into a malicious form.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://advisories.stormshield.eu/2020-011/ | Vendor Advisory | |
cve@mitre.org | https://twitter.com/_ACKNAK_ | Not Applicable | |
cve@mitre.org | https://www.digitemis.com/category/blog/actualite/ | Not Applicable | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu/2020-011/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://twitter.com/_ACKNAK_ | Not Applicable | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.digitemis.com/category/blog/actualite/ | Not Applicable |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:35:13.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.digitemis.com/category/blog/actualite/" }, { "tags": [ "x_transferred" ], "url": "https://twitter.com/_ACKNAK_" }, { "tags": [ "x_transferred" ], "url": "https://advisories.stormshield.eu/2020-011/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-11711", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T18:11:43.071000Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T18:12:05.072Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Stormshield SNS 3.8.0. Authenticated Stored XSS in the admin login panel leads to SSL VPN credential theft. A malicious disclaimer file can be uploaded from the admin panel. The resulting file is rendered on the authentication interface of the admin panel. It is possible to inject malicious HTML content in order to execute JavaScript inside a victim\u0027s browser. This results in a stored XSS on the authentication interface of the admin panel. Moreover, an unsecured authentication form is present on the authentication interface of the SSL VPN captive portal. Users are allowed to save their credentials inside the browser. If an administrator saves his credentials through this unsecured form, these credentials could be stolen via the stored XSS on the admin panel without user interaction. Another possible exploitation would be modification of the authentication form of the admin panel into a malicious form." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-25T15:53:55.355471", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.digitemis.com/category/blog/actualite/" }, { "url": "https://twitter.com/_ACKNAK_" }, { "url": "https://advisories.stormshield.eu/2020-011/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-11711", "datePublished": "2023-08-25T00:00:00", "dateReserved": "2020-04-12T00:00:00", "dateUpdated": "2024-10-02T18:12:05.072Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-11711\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-08-25T16:15:07.857\",\"lastModified\":\"2024-11-21T04:58:27.460\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in Stormshield SNS 3.8.0. Authenticated Stored XSS in the admin login panel leads to SSL VPN credential theft. A malicious disclaimer file can be uploaded from the admin panel. The resulting file is rendered on the authentication interface of the admin panel. It is possible to inject malicious HTML content in order to execute JavaScript inside a victim\u0027s browser. This results in a stored XSS on the authentication interface of the admin panel. Moreover, an unsecured authentication form is present on the authentication interface of the SSL VPN captive portal. Users are allowed to save their credentials inside the browser. If an administrator saves his credentials through this unsecured form, these credentials could be stolen via the stored XSS on the admin panel without user interaction. Another possible exploitation would be modification of the authentication form of the admin panel into a malicious form.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en Stormshield SNS 3.8.0. El XSS almacenado autenticado en el panel de inicio de sesi\u00f3n del administrador conduce al robo de credenciales SSL VPN. Se puede cargar un archivo de renuncia malicioso desde el panel de administraci\u00f3n. El archivo resultante se muestra en la interfaz de autenticaci\u00f3n del panel de administraci\u00f3n. Es posible inyectar contenido HTML malicioso para ejecutar JavaScript dentro del navegador de la v\u00edctima. Esto resulta en un XSS almacenado en la interfaz de autenticaci\u00f3n del panel de administraci\u00f3n. Adem\u00e1s, hay un formulario de autenticaci\u00f3n no seguro en la interfaz de autenticaci\u00f3n del portal cautivo VPN SSL. Se permite a los usuarios guardar sus credenciales dentro del navegador. Si un administrador guarda sus credenciales a trav\u00e9s de este formulario no seguro, estas credenciales podr\u00edan ser robadas a trav\u00e9s del XSS almacenado en el panel de administraci\u00f3n sin interacci\u00f3n del usuario. Otra posible explotaci\u00f3n ser\u00eda la modificaci\u00f3n del formulario de autenticaci\u00f3n del panel de administraci\u00f3n en un formulario malicioso.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.7,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.6.0\",\"versionEndExcluding\":\"3.7.13\",\"matchCriteriaId\":\"77B7EAEB-CE18-42D3-8D66-F96CC6CDBFEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.8.0\",\"versionEndExcluding\":\"3.11.0\",\"matchCriteriaId\":\"9BC1815B-DD6E-4CFB-9C3A-FAE05FD4E07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.1.1\",\"matchCriteriaId\":\"90E181AB-A89E-4A11-A2AA-5E53C0074B79\"}]}]}],\"references\":[{\"url\":\"https://advisories.stormshield.eu/2020-011/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://twitter.com/_ACKNAK_\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"https://www.digitemis.com/category/blog/actualite/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"https://advisories.stormshield.eu/2020-011/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://twitter.com/_ACKNAK_\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"https://www.digitemis.com/category/blog/actualite/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.digitemis.com/category/blog/actualite/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://twitter.com/_ACKNAK_\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://advisories.stormshield.eu/2020-011/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T11:35:13.599Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-11711\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-02T18:11:43.071000Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-02T18:11:49.608Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://www.digitemis.com/category/blog/actualite/\"}, {\"url\": \"https://twitter.com/_ACKNAK_\"}, {\"url\": \"https://advisories.stormshield.eu/2020-011/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An issue was discovered in Stormshield SNS 3.8.0. Authenticated Stored XSS in the admin login panel leads to SSL VPN credential theft. A malicious disclaimer file can be uploaded from the admin panel. The resulting file is rendered on the authentication interface of the admin panel. It is possible to inject malicious HTML content in order to execute JavaScript inside a victim\u0027s browser. This results in a stored XSS on the authentication interface of the admin panel. Moreover, an unsecured authentication form is present on the authentication interface of the SSL VPN captive portal. Users are allowed to save their credentials inside the browser. If an administrator saves his credentials through this unsecured form, these credentials could be stolen via the stored XSS on the admin panel without user interaction. Another possible exploitation would be modification of the authentication form of the admin panel into a malicious form.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-08-25T15:53:55.355471\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2020-11711\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-02T18:12:05.072Z\", \"dateReserved\": \"2020-04-12T00:00:00\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2023-08-25T00:00:00\", \"assignerShortName\": \"mitre\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.