{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-13576","assignerOrgId":"b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b","assignerShortName":"talos","dateUpdated":"2024-08-04T12:25:16.135Z","dateReserved":"2020-05-26T00:00:00.000Z","datePublished":"2021-02-10T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b","shortName":"talos","dateUpdated":"2024-03-01T01:06:14.238Z"},"descriptions":[{"lang":"en","value":"A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability."}],"affected":[{"vendor":"n/a","product":"Genivia","versions":[{"version":"Genivia gSOAP 2.8.107","status":"affected"}]}],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1187"},{"name":"FEDORA-2021-faea36a9c3","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMTJ3SJJ22SFLBLPKFADV7NVBH7UFA23/"},{"name":"FEDORA-2021-1da151722e","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JINMAJB4WQASTKTNSPQL3V7YMSYPKIA2/"},{"name":"[debian-lts-announce] 20240229 [SECURITY] [DLA 3745-1] gsoap security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2024/02/msg00015.html"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-680: Integer Overflow to Buffer Overflow","cweId":"CWE-680"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T12:25:16.135Z"},"title":"CVE Program Container","references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1187","tags":["x_transferred"]},{"name":"FEDORA-2021-faea36a9c3","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMTJ3SJJ22SFLBLPKFADV7NVBH7UFA23/"},{"name":"FEDORA-2021-1da151722e","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JINMAJB4WQASTKTNSPQL3V7YMSYPKIA2/"},{"name":"[debian-lts-announce] 20240229 [SECURITY] [DLA 3745-1] gsoap security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2024/02/msg00015.html"}]}]}}