fkie_cve-2020-9743
Vulnerability from fkie_nvd
Published
2020-09-10 17:15
Modified
2024-11-21 05:41
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
AEM versions 6.5.5.0 (and below), 6.4.8.1 (and below), 6.3.3.8 (and below) and 6.2 SP1-CFP20 (and below) are affected by an HTML injection vulnerability in the content editor component that allows unauthenticated users to craft an HTTP request that includes arbitrary HTML code in a parameter value. An attacker could then use the malicious GET request to lure victims to perform unsafe actions in the page (ex. phishing).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | experience_manager | * | |
adobe | experience_manager | * | |
adobe | experience_manager | * | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 | |
adobe | experience_manager | 6.2.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F61E8D62-4FB7-48E0-A750-C3F6EBE5F613", "versionEndIncluding": "6.3.3.8", "versionStartIncluding": "6.3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0482E99D-21DC-489C-8E0B-707A70A48FC0", "versionEndIncluding": "6.4.8.1", "versionStartIncluding": "6.4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9D06479-83AE-4F9A-BAE9-7849798F1A30", "versionEndIncluding": "6.5.5.0", "versionStartIncluding": "6.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "AE7DD1A2-EB34-4862-878F-0768D91ED375", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp1:*:*:*:*:*:*", "matchCriteriaId": "E3E28FB2-DD09-471E-A846-45D00A1DEAE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp10:*:*:*:*:*:*", "matchCriteriaId": "1537FAD0-6B8C-440E-ADBE-6E55B5E95545", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp11:*:*:*:*:*:*", "matchCriteriaId": "80CD82AA-BD51-44ED-843D-155E0253A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp12.1:*:*:*:*:*:*", "matchCriteriaId": "0F50647B-FD1C-43E4-A688-F9B4ED244028", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp13:*:*:*:*:*:*", "matchCriteriaId": "A97165F4-F357-4271-A141-4091973F9A34", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp14:*:*:*:*:*:*", "matchCriteriaId": "92D76A04-0B29-4BF2-B016-7FA82B12FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp15:*:*:*:*:*:*", "matchCriteriaId": "0C555A79-F619-4119-9DEA-0679059F6111", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp16:*:*:*:*:*:*", "matchCriteriaId": "9732E3D9-15A3-4571-8B40-88B7FF64D994", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp17:*:*:*:*:*:*", "matchCriteriaId": "B2DB2AFF-4C6D-4CFD-8BCD-6ED5FABF677C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp18:*:*:*:*:*:*", "matchCriteriaId": "7D72D08D-3B08-4FA9-A5D8-1709229CCAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp19:*:*:*:*:*:*", "matchCriteriaId": "2CEA0E51-6982-4F18-A7BC-500C341E415E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp2:*:*:*:*:*:*", "matchCriteriaId": "A531C028-FED4-473E-BB08-E4D92C3AE5F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp20:*:*:*:*:*:*", "matchCriteriaId": "880D18CA-1FF0-436D-91C0-E29C85C4AD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp3:*:*:*:*:*:*", "matchCriteriaId": "D8871723-95D7-4A4A-A232-A7CE7F5EE020", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp4:*:*:*:*:*:*", "matchCriteriaId": "8C22A756-74DB-4D4F-9B32-00D85F127260", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp5:*:*:*:*:*:*", "matchCriteriaId": "0EBDA638-4C8A-438F-96E2-B5EAA2B21DCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp6:*:*:*:*:*:*", "matchCriteriaId": "5A457620-A285-4F7F-8FA7-3F0C514E4658", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp7:*:*:*:*:*:*", "matchCriteriaId": "9BA4E1EE-C90A-4028-8DBC-47F6DF90021E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp8:*:*:*:*:*:*", "matchCriteriaId": "BD076F63-6F46-4852-9080-1AD72B5001F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp9:*:*:*:*:*:*", "matchCriteriaId": "6D75869C-D57A-480B-941A-8679EABAE593", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "AEM versions 6.5.5.0 (and below), 6.4.8.1 (and below), 6.3.3.8 (and below) and 6.2 SP1-CFP20 (and below) are affected by an HTML injection vulnerability in the content editor component that allows unauthenticated users to craft an HTTP request that includes arbitrary HTML code in a parameter value. An attacker could then use the malicious GET request to lure victims to perform unsafe actions in the page (ex. phishing)." }, { "lang": "es", "value": "AEM versiones 6.5.5.0 (y anteriores), 6.4.8.1 (y anteriores), 6.3.3.8 (y anteriores) y 6.2 SP1-CFP20 (y posteriores), est\u00e1n afectadas por una vulnerabilidad de inyecci\u00f3n HTML en el componente content editor que permite a usuarios no autenticados dise\u00f1ar una petici\u00f3n HTTP que incluya c\u00f3digo HTML arbitrario en un valor de par\u00e1metro. Un atacante podr\u00eda utilizar la petici\u00f3n GET maliciosa para atraer a las v\u00edctimas a llevar a cabo acciones no seguras en la p\u00e1gina (por ejemplo, phishing)" } ], "id": "CVE-2020-9743", "lastModified": "2024-11-21T05:41:12.080", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@adobe.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-10T17:15:41.377", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/experience-manager/apsb20-56.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/experience-manager/apsb20-56.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@adobe.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.