Show plain JSON{"id": "CVE-2020-26280", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 3.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 6.8, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 8.9, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 6.0, "exploitabilityScore": 2.3}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 8.9, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 6.0, "exploitabilityScore": 2.3}]}, "published": "2020-12-18T19:15:14.343", "references": [{"url": "https://github.com/OpenSlides/OpenSlides/blob/master/CHANGELOG.rst#version-33-2020-12-18", "tags": ["Release Notes", "Third Party Advisory"], "source": "security-advisories@github.com"}, {"url": "https://github.com/OpenSlides/OpenSlides/commit/f3809fc8a97ee305d721662a75f788f9e9d21938", "tags": ["Patch", "Third Party Advisory"], "source": "security-advisories@github.com"}, {"url": "https://github.com/OpenSlides/OpenSlides/pull/5714", "tags": ["Patch", "Third Party Advisory"], "source": "security-advisories@github.com"}, {"url": "https://github.com/OpenSlides/OpenSlides/security/advisories/GHSA-w5wr-98qm-jx92", "tags": ["Third Party Advisory"], "source": "security-advisories@github.com"}, {"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-043.txt", "tags": ["Broken Link"], "source": "security-advisories@github.com"}, {"url": "https://github.com/OpenSlides/OpenSlides/blob/master/CHANGELOG.rst#version-33-2020-12-18", "tags": ["Release Notes", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/OpenSlides/OpenSlides/commit/f3809fc8a97ee305d721662a75f788f9e9d21938", "tags": ["Patch", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/OpenSlides/OpenSlides/pull/5714", "tags": ["Patch", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/OpenSlides/OpenSlides/security/advisories/GHSA-w5wr-98qm-jx92", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-043.txt", "tags": ["Broken Link"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-79"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "OpenSlides is a free, Web-based presentation and assembly system for managing and projecting agenda, motions, and elections of assemblies. OpenSlides version 3.2, due to unsufficient user input validation and escaping, it is vulnerable to persistant cross-site scripting (XSS). In the web applications users can enter rich text in various places, e.g. for personal notes or in motions. These fields can be used to store arbitrary JavaScript Code that will be executed when other users read the respective text. An attacker could utilize this vulnerability be used to manipulate votes of other users, hijack the moderators session or simply disturb the meeting. The vulnerability was introduced with 6eae497abeab234418dfbd9d299e831eff86ed45 on 16.04.2020, which is first included in the 3.2 release. It has been patched in version 3.3 ( in commit f3809fc8a97ee305d721662a75f788f9e9d21938, merged in master on 20.11.2020)."}, {"lang": "es", "value": "OpenSlides es un sistema de presentaci\u00f3n y ensamblaje gratuito basado en la web para administrar y proyectar agenda, movimientos y elecciones de las reuniones. OpenSlides versi\u00f3n 3.2, debido a una comprobaci\u00f3n insuficiente de la entrada de usuario y al escape, es vulnerable a un ataque de tipo cross-site scripting (XSS) persistente. En las aplicaciones web, los usuarios pueden ingresar texto enriquecido en varios lugares, por ejemplo, para notas personales o en movimientos. Estos campos pueden ser utilizados para almacenar c\u00f3digo JavaScript arbitrario que ser\u00e1 ejecutado cuando otros usuarios lean el texto respectivo. Un atacante podr\u00eda usar esta vulnerabilidad para manipular los votos de otros usuarios, secuestrar la sesi\u00f3n de los moderadores o simplemente perturbar la reuni\u00f3n. La vulnerabilidad fue introducida con 6eae497abeab234418dfbd9d299e831eff86ed45 en 16.04.2020, el cual es incluida por primera vez en la versi\u00f3n 3.2. Ha sido parcheado en la versi\u00f3n 3.3 (en el commit f3809fc8a97ee305d721662a75f788f9e9d21938, fusionada en master en 20.11.2020)"}], "lastModified": "2024-11-21T05:19:44.710", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:openslides:openslides:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADA066D9-25CC-46AA-AADC-C717C76CE5EA"}], "operator": "OR"}]}], "sourceIdentifier": "security-advisories@github.com"}