Lucene search

K
cvelistVulDBCVELIST:CVE-2020-36762
HistoryJul 18, 2023 - 3:00 p.m.

CVE-2020-36762 ONS Digital RAS Collection Instrument comment.yml jobs os command injection

2023-07-1815:00:04
CWE-78
VulDB
www.cve.org
vulnerability
ons digital ras
collection instrument
2.0.27
critical
os command injection
upgrade
patch
dcaad2540f7d50c512ff2e031d3778dd9337db2b
vdb-234248

5.2 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:S/C:P/I:P/A:P

5.5 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

10 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.5%

A vulnerability was found in ONS Digital RAS Collection Instrument up to 2.0.27 and classified as critical. Affected by this issue is the function jobs of the file .github/workflows/comment.yml. The manipulation of the argument $COMMENT_BODY leads to os command injection. Upgrading to version 2.0.28 is able to address this issue. The name of the patch is dcaad2540f7d50c512ff2e031d3778dd9337db2b. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-234248.

CNA Affected

[
  {
    "vendor": "ONS Digital",
    "product": "RAS Collection Instrument",
    "versions": [
      {
        "version": "2.0.0",
        "status": "affected"
      },
      {
        "version": "2.0.1",
        "status": "affected"
      },
      {
        "version": "2.0.2",
        "status": "affected"
      },
      {
        "version": "2.0.3",
        "status": "affected"
      },
      {
        "version": "2.0.4",
        "status": "affected"
      },
      {
        "version": "2.0.5",
        "status": "affected"
      },
      {
        "version": "2.0.6",
        "status": "affected"
      },
      {
        "version": "2.0.7",
        "status": "affected"
      },
      {
        "version": "2.0.8",
        "status": "affected"
      },
      {
        "version": "2.0.9",
        "status": "affected"
      },
      {
        "version": "2.0.10",
        "status": "affected"
      },
      {
        "version": "2.0.11",
        "status": "affected"
      },
      {
        "version": "2.0.12",
        "status": "affected"
      },
      {
        "version": "2.0.13",
        "status": "affected"
      },
      {
        "version": "2.0.14",
        "status": "affected"
      },
      {
        "version": "2.0.15",
        "status": "affected"
      },
      {
        "version": "2.0.16",
        "status": "affected"
      },
      {
        "version": "2.0.17",
        "status": "affected"
      },
      {
        "version": "2.0.18",
        "status": "affected"
      },
      {
        "version": "2.0.19",
        "status": "affected"
      },
      {
        "version": "2.0.20",
        "status": "affected"
      },
      {
        "version": "2.0.21",
        "status": "affected"
      },
      {
        "version": "2.0.22",
        "status": "affected"
      },
      {
        "version": "2.0.23",
        "status": "affected"
      },
      {
        "version": "2.0.24",
        "status": "affected"
      },
      {
        "version": "2.0.25",
        "status": "affected"
      },
      {
        "version": "2.0.26",
        "status": "affected"
      },
      {
        "version": "2.0.27",
        "status": "affected"
      }
    ]
  }
]

5.2 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:S/C:P/I:P/A:P

5.5 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

10 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.5%

Related for CVELIST:CVE-2020-36762