Lucene search

K
cve[email protected]CVE-2020-36762
HistoryJul 18, 2023 - 3:15 p.m.

CVE-2020-36762

2023-07-1815:15:11
CWE-78
web.nvd.nist.gov
26
cve-2020-36762
ons digital
ras collection instrument
critical vulnerability
os command injection
upgrade
patch
vdb-234248
nvd

5.2 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:S/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.5%

A vulnerability was found in ONS Digital RAS Collection Instrument up to 2.0.27 and classified as critical. Affected by this issue is the function jobs of the file .github/workflows/comment.yml. The manipulation of the argument $COMMENT_BODY leads to os command injection. Upgrading to version 2.0.28 is able to address this issue. The name of the patch is dcaad2540f7d50c512ff2e031d3778dd9337db2b. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-234248.

Affected configurations

Vulners
NVD
Node
onsras_collection_instrumentMatch2.0.0
OR
onsras_collection_instrumentMatch2.0.1
OR
onsras_collection_instrumentMatch2.0.2
OR
onsras_collection_instrumentMatch2.0.3
OR
onsras_collection_instrumentMatch2.0.4
OR
onsras_collection_instrumentMatch2.0.5
OR
onsras_collection_instrumentMatch2.0.6
OR
onsras_collection_instrumentMatch2.0.7
OR
onsras_collection_instrumentMatch2.0.8
OR
onsras_collection_instrumentMatch2.0.9
OR
onsras_collection_instrumentMatch2.0.10
OR
onsras_collection_instrumentMatch2.0.11
OR
onsras_collection_instrumentMatch2.0.12
OR
onsras_collection_instrumentMatch2.0.13
OR
onsras_collection_instrumentMatch2.0.14
OR
onsras_collection_instrumentMatch2.0.15
OR
onsras_collection_instrumentMatch2.0.16
OR
onsras_collection_instrumentMatch2.0.17
OR
onsras_collection_instrumentMatch2.0.18
OR
onsras_collection_instrumentMatch2.0.19
OR
onsras_collection_instrumentMatch2.0.20
OR
onsras_collection_instrumentMatch2.0.21
OR
onsras_collection_instrumentMatch2.0.22
OR
onsras_collection_instrumentMatch2.0.23
OR
onsras_collection_instrumentMatch2.0.24
OR
onsras_collection_instrumentMatch2.0.25
OR
onsras_collection_instrumentMatch2.0.26
OR
onsras_collection_instrumentMatch2.0.27
VendorProductVersionCPE
onsras_collection_instrument2.0.0cpe:2.3:a:ons:ras_collection_instrument:2.0.0:*:*:*:*:*:*:*
onsras_collection_instrument2.0.1cpe:2.3:a:ons:ras_collection_instrument:2.0.1:*:*:*:*:*:*:*
onsras_collection_instrument2.0.2cpe:2.3:a:ons:ras_collection_instrument:2.0.2:*:*:*:*:*:*:*
onsras_collection_instrument2.0.3cpe:2.3:a:ons:ras_collection_instrument:2.0.3:*:*:*:*:*:*:*
onsras_collection_instrument2.0.4cpe:2.3:a:ons:ras_collection_instrument:2.0.4:*:*:*:*:*:*:*
onsras_collection_instrument2.0.5cpe:2.3:a:ons:ras_collection_instrument:2.0.5:*:*:*:*:*:*:*
onsras_collection_instrument2.0.6cpe:2.3:a:ons:ras_collection_instrument:2.0.6:*:*:*:*:*:*:*
onsras_collection_instrument2.0.7cpe:2.3:a:ons:ras_collection_instrument:2.0.7:*:*:*:*:*:*:*
onsras_collection_instrument2.0.8cpe:2.3:a:ons:ras_collection_instrument:2.0.8:*:*:*:*:*:*:*
onsras_collection_instrument2.0.9cpe:2.3:a:ons:ras_collection_instrument:2.0.9:*:*:*:*:*:*:*
Rows per page:
1-10 of 281

CNA Affected

[
  {
    "vendor": "ONS Digital",
    "product": "RAS Collection Instrument",
    "versions": [
      {
        "version": "2.0.0",
        "status": "affected"
      },
      {
        "version": "2.0.1",
        "status": "affected"
      },
      {
        "version": "2.0.2",
        "status": "affected"
      },
      {
        "version": "2.0.3",
        "status": "affected"
      },
      {
        "version": "2.0.4",
        "status": "affected"
      },
      {
        "version": "2.0.5",
        "status": "affected"
      },
      {
        "version": "2.0.6",
        "status": "affected"
      },
      {
        "version": "2.0.7",
        "status": "affected"
      },
      {
        "version": "2.0.8",
        "status": "affected"
      },
      {
        "version": "2.0.9",
        "status": "affected"
      },
      {
        "version": "2.0.10",
        "status": "affected"
      },
      {
        "version": "2.0.11",
        "status": "affected"
      },
      {
        "version": "2.0.12",
        "status": "affected"
      },
      {
        "version": "2.0.13",
        "status": "affected"
      },
      {
        "version": "2.0.14",
        "status": "affected"
      },
      {
        "version": "2.0.15",
        "status": "affected"
      },
      {
        "version": "2.0.16",
        "status": "affected"
      },
      {
        "version": "2.0.17",
        "status": "affected"
      },
      {
        "version": "2.0.18",
        "status": "affected"
      },
      {
        "version": "2.0.19",
        "status": "affected"
      },
      {
        "version": "2.0.20",
        "status": "affected"
      },
      {
        "version": "2.0.21",
        "status": "affected"
      },
      {
        "version": "2.0.22",
        "status": "affected"
      },
      {
        "version": "2.0.23",
        "status": "affected"
      },
      {
        "version": "2.0.24",
        "status": "affected"
      },
      {
        "version": "2.0.25",
        "status": "affected"
      },
      {
        "version": "2.0.26",
        "status": "affected"
      },
      {
        "version": "2.0.27",
        "status": "affected"
      }
    ]
  }
]

5.2 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:S/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.5%

Related for CVE-2020-36762