Vulnerability Name:

CVE-2020-9952

Assigned:2020-10-16
Published:2020-10-16
Updated:2023-01-09
Summary:An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.
CVSS v3 Severity:7.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
7.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
7.1 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
5.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-79
References:Source: MITRE
Type: CNA
CVE-2020-9952

Source: product-security@apple.com
Type: Mailing List, Third Party Advisory
product-security@apple.com

Source: product-security@apple.com
Type: Mailing List, Third Party Advisory
product-security@apple.com

Source: product-security@apple.com
Type: Mailing List, Third Party Advisory
product-security@apple.com

Source: product-security@apple.com
Type: Mailing List, Third Party Advisory
product-security@apple.com

Source: product-security@apple.com
Type: Mailing List
product-security@apple.com

Source: product-security@apple.com
Type: Third Party Advisory
product-security@apple.com

Source: product-security@apple.com
Type: Release Notes, Vendor Advisory
product-security@apple.com

Source: product-security@apple.com
Type: Release Notes, Vendor Advisory
product-security@apple.com

Source: product-security@apple.com
Type: Release Notes, Vendor Advisory
product-security@apple.com

Source: product-security@apple.com
Type: Release Notes, Vendor Advisory
product-security@apple.com

Source: product-security@apple.com
Type: Release Notes, Vendor Advisory
product-security@apple.com

Source: product-security@apple.com
Type: Vendor Advisory
product-security@apple.com

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/a:redhat:enterprise_linux:8::crb:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:8:*:*:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:8::baseos:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2020-9952 (CCN-188411)

    Assigned:2020-09-16
    Published:2020-09-16
    Updated:2020-12-23
    Summary:An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.
    CVSS v3 Severity:7.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)
    6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L/E:H/RL:O/RC:C)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): Required
    Scope:Scope (S): Changed
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    6.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
    5.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): Required
    Scope:Scope (S): Changed
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): None
    7.1 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)
    6.8 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L/E:H/RL:O/RC:C)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): Required
    Scope:Scope (S): Changed
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Medium
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): None
    Integrity (I): Partial
    Availibility (A): Partial
    5.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): Single_Instance
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): None
    Vulnerability Type:CWE-79
    Vulnerability Consequences:Cross-Site Scripting
    References:Source: MITRE
    Type: CNA
    CVE-2020-9952

    Source: FULLDISC
    Type: Mailing List, Third Party Advisory
    20201115 APPLE-SA-2020-11-13-5 Additional information for APPLE-SA-2020-09-16-3 Safari 14.0

    Source: FULLDISC
    Type: Mailing List, Third Party Advisory
    20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0

    Source: FULLDISC
    Type: Mailing List, Third Party Advisory
    20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0

    Source: FULLDISC
    Type: Mailing List, Third Party Advisory
    20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0

    Source: MLIST
    Type: Mailing List
    [oss-security] 20201123 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0008

    Source: XF
    Type: UNKNOWN
    apple-safari-cve20209952-xss(188411)

    Source: GENTOO
    Type: UNKNOWN
    GLSA-202012-10

    Source: CCN
    Type: Apple security document HT211843
    About the security content of tvOS 14.0

    Source: CCN
    Type: Apple security document HT211844
    About the security content of watchOS 7.0

    Source: CCN
    Type: Apple security document HT211845
    About the security content of Safari 14.0

    Source: CCN
    Type: Apple security document HT211846
    About the security content of iCloud for Windows 11.4

    Source: CCN
    Type: Apple security document HT211847
    About the security content of iCloud for Windows 7.21

    Source: CCN
    Type: Apple security document HT211850
    About the security content of iOS 14.0 and iPadOS 14.0

    Source: MISC
    Type: Release Notes, Vendor Advisory
    https://support.apple.com/HT211843

    Source: MISC
    Type: Release Notes, Vendor Advisory
    https://support.apple.com/HT211844

    Source: MISC
    Type: Release Notes, Vendor Advisory
    https://support.apple.com/HT211845

    Source: MISC
    Type: Release Notes, Vendor Advisory
    https://support.apple.com/HT211846

    Source: MISC
    Type: Release Notes, Vendor Advisory
    https://support.apple.com/HT211847

    Source: MISC
    Type: Vendor Advisory
    https://support.apple.com/HT211850

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/a:redhat:enterprise_linux:8::crb:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:8:*:*:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:8::baseos:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:apple:ios:13.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:13.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:watchos:6.2.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:tvos:13.4.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ipados:13.5.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:8033
    P
    libjavascriptcoregtk-5_0-0-2.38.6-150400.4.39.1 on GA media (Moderate)
    2023-06-20
    oval:org.opensuse.security:def:7603
    P
    libjavascriptcoregtk-4_0-18-2.38.6-150400.4.39.1 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:7941
    P
    libjavascriptcoregtk-4_1-0-2.38.6-150400.4.39.1 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:3401
    P
    xen-4.12.1_06-1.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:3018
    P
    augeas-1.10.1-2.6 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:3320
    P
    pam_yubico-2.26-1.25 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:94648
    P
    libjavascriptcoregtk-4_0-18-2.36.0-150400.2.13 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:94950
    P
    libjavascriptcoregtk-4_1-0-2.36.0-150400.2.13 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:95031
    P
    libjavascriptcoregtk-5_0-0-2.36.0-150400.2.12 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:119097
    P
    Security update for webkit2gtk3 (Important)
    2022-02-17
    oval:org.opensuse.security:def:118905
    P
    Security update for webkit2gtk3 (Important)
    2022-01-25
    oval:org.opensuse.security:def:119587
    P
    Security update for webkit2gtk3 (Important)
    2022-01-25
    oval:org.opensuse.security:def:1070
    P
    Security update for webkit2gtk3 (Important)
    2022-01-25
    oval:org.opensuse.security:def:101609
    P
    Security update for webkit2gtk3 (Important)
    2022-01-25
    oval:org.opensuse.security:def:119212
    P
    Security update for webkit2gtk3 (Important)
    2022-01-25
    oval:org.opensuse.security:def:101759
    P
    Security update for webkit2gtk3 (Important)
    2022-01-25
    oval:org.opensuse.security:def:118715
    P
    Security update for webkit2gtk3 (Important)
    2022-01-25
    oval:org.opensuse.security:def:119402
    P
    Security update for webkit2gtk3 (Important)
    2022-01-25
    oval:org.opensuse.security:def:898
    P
    Security update for webkit2gtk3 (Important)
    2022-01-25
    oval:org.opensuse.security:def:127265
    P
    Security update for webkit2gtk3 (Important)
    2022-01-20
    oval:org.opensuse.security:def:5226
    P
    Security update for webkit2gtk3 (Important)
    2022-01-20
    oval:org.opensuse.security:def:125702
    P
    Security update for webkit2gtk3 (Important)
    2022-01-20
    oval:org.opensuse.security:def:6020
    P
    Security update for webkit2gtk3 (Important)
    2022-01-20
    oval:org.opensuse.security:def:126868
    P
    Security update for webkit2gtk3 (Important)
    2022-01-20
    oval:com.redhat.rhsa:def:20204451
    P
    RHSA-2020:4451: GNOME security, bug fix, and enhancement update (Moderate)
    2020-11-04
    BACK
    apple ios 13.5.1
    apple safari 13.1.2
    apple watchos 6.2.8
    apple tvos 13.4.8
    apple ipados 13.5.1