Vulnerability Name: | CVE-2020-19203 (CCN-205446) |
Assigned: | 2020-09-30 |
Published: | 2020-09-30 |
Updated: | 2022-05-13 |
Summary: | An authenticated Cross-Site Scripting (XSS) vulnerability was found in widgets/widgets/wake_on_lan_widget.php, a component of the pfSense software WebGUI, on version 2.4.4-p2 and earlier. The widget did not encode the descr (description) parameter of wake-on-LAN entries in its output, leading to a possible stored XSS.
|
CVSS v3 Severity: | 5.4 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) 5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): Required | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): None | 6.4 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) 6.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): None |
|
CVSS v2 Severity: | 3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): Single_Instance | Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None | 5.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): Single_Instance
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): None |
|
Vulnerability Type: | CWE-79
|
Vulnerability Consequences: | Cross-Site Scripting |
References: | Source: MITRE Type: CNA CVE-2020-19203
Source: CCN Type: Netgate Web site 2.4.4-p3 New Features and Changes
Source: MISC Type: Vendor Advisory https://docs.netgate.com/pfsense/en/latest/releases/2-4-4-p3.html
Source: XF Type: UNKNOWN netgate-pfsense-cve202019203-xss(205446)
Source: MISC Type: Third Party Advisory https://gist.github.com/dharmeshbaskaran/55d546496bfb0ba28117e846d8b785db
Source: MISC Type: Vendor Advisory https://www.netgate.com/assets/downloads/advisories/pfSense-SA-19_04.webgui.asc
Source: MISC Type: Product, Release Notes, Vendor Advisory https://www.pfsense.org/download/
|
Vulnerable Configuration: | Configuration 1: cpe:/a:netgate:pfsense:*:*:*:*:*:*:*:* (Version < 2.4.4)OR cpe:/a:netgate:pfsense:2.4.4:p1:*:*:*:*:*:*OR cpe:/a:netgate:pfsense:2.4.4:p2:*:*:*:*:*:*OR cpe:/a:netgate:pfsense:2.4.4:-:*:*:*:*:*:* Configuration CCN 1: cpe:/a:pfsense:pfsense:2.0.1:*:*:*:*:*:*:*OR cpe:/a:netgate:pfsense:2.1.3:*:*:*:*:*:*:*OR cpe:/a:pfsense:pfsense:2.2.2:*:*:*:*:*:*:*OR cpe:/a:pfsense:pfsense:2.2.5:*:*:*:*:*:*:*OR cpe:/a:pfsense:pfsense:2.2.6:*:*:*:*:*:*:*OR cpe:/a:pfsense:pfsense:2.3.2:*:*:*:*:*:*:*OR cpe:/a:pfsense:pfsense:2.4.1:*:*:*:*:*:*:*OR cpe:/a:pfsense:pfsense:2.4.4:p1:*:*:*:*:*:*OR cpe:/a:pfsense:pfsense:2.4.4:p2:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |