Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-11036
HistoryMay 05, 2020 - 12:00 a.m.

CVE-2020-11036

2020-05-0500:00:00
ubuntu.com
ubuntu.com
9

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N

0.001 Low

EPSS

Percentile

29.4%

In GLPI before version 9.4.6 there are multiple related stored XSS
vulnerabilities. The package is vulnerable to Stored XSS in the comments of
items in the Knowledge base. Adding a comment with content
“<script>alert(1)</script>” reproduces the attack. This can be exploited by
a user with administrator privileges in the User-Agent field. It can also
be exploited by an outside party through the following steps: 1. Create a
user with the surname " onmouseover="alert(document.cookie) and an empty
first name. 2. With this user, create a ticket 3. As an administrator (or
other privileged user) open the created ticket 4. On the “last update”
field, put your mouse on the name of the user 5. The XSS fires This is
fixed in version 9.4.6.

OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchglpi< anyUNKNOWN

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N

0.001 Low

EPSS

Percentile

29.4%