Show plain JSON{"id": "CVE-2020-24983", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2021-03-11T22:15:12.263", "references": [{"url": "https://c41nc.co.uk/cve-2020-24983/", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://c41nc.co.uk/cve-2020-24983/", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-352"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in Quadbase EspressReports ES 7 Update 9. An unauthenticated attacker can create a malicious HTML file that houses a POST request made to the DashboardBuilder within the target web application. This request will utilise the target admin session and perform the authenticated request (to change the Dashboard name) as if the victim had done so themselves, aka CSRF."}, {"lang": "es", "value": "Se detect\u00f3 un problema en Quadbase EspressReports ES versi\u00f3n 7 Update 9. Un atacante no autenticado puede crear un archivo HTML malicioso que alberga una petici\u00f3n POST realizada al DashboardBuilder dentro de la aplicaci\u00f3n web de destino. Esta petici\u00f3n usar\u00e1 la sesi\u00f3n de administrador de destino y llevar\u00e1 a cabo la petici\u00f3n autenticada (para cambiar el nombre del Dashboard) como si la v\u00edctima lo hubiera hecho ella misma, tambi\u00e9n se conoce como CSRF"}], "lastModified": "2024-11-21T05:16:19.813", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:quadbase:espressreports_es:7:update_9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7039B2DF-72FD-4DB1-A445-56558F3C08B1"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}