Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Required
Privileges Required
None
Attack Vector
Network
0

CVE-2020-13954

Disclosure Date: November 12, 2020
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
6.1 Medium
Impact Score:
2.7
Exploitability Score:
2.8
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
Required
Scope (S):
Changed
Confidentiality (C):
Low
Integrity (I):
Low
Availability (A):
None

General Information

Vendors

  • apache,
  • netapp,
  • oracle

Products

  • business intelligence 12.2.1.3.0,
  • business intelligence 12.2.1.4.0,
  • business intelligence 5.5.0.0.0,
  • business intelligence 5.9.0.0.0,
  • communications messaging server 8.0.2,
  • communications messaging server 8.1,
  • cxf,
  • retail order broker cloud service 15.0,
  • snap creator framework -,
  • vasa provider for clustered data ontap

References

Advisory

Additional Info

Technical Analysis