CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
93.3%
A Server-Side Template Injection was identified in BrowserUp Proxy enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. This has been assigned CVE-2020-26282.
Effective Immediately, all users should upgrade to version 2.1.2 or higher.
None.
https://securitylab.github.com/research/bean-validation-RCE
If you have any questions or comments about this advisory:
Vendor | Product | Version | CPE |
---|---|---|---|
com.browserup | browserup-proxy | * | cpe:2.3:a:com.browserup:browserup-proxy:*:*:*:*:*:*:*:* |
github.com/advisories/GHSA-wmfg-55f9-j8hq
github.com/browserup/browserup-proxy/commit/4b38e7a3e20917e5c3329d0d4e9590bed9d578ab
github.com/browserup/browserup-proxy/releases/tag/v2.1.2
github.com/browserup/browserup-proxy/security/advisories/GHSA-wmfg-55f9-j8hq
nvd.nist.gov/vuln/detail/CVE-2020-26282
securitylab.github.com/research/bean-validation-RCE
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
93.3%