{"containers":{"cna":{"affected":[{"product":"touchbase.ai","vendor":"puncsky","versions":[{"status":"affected","version":"< 2.0"}]}],"descriptions":[{"lang":"en","value":"toucbase.ai before version 2.0 leaks information by not stripping exif data from images. Anyone with access to the uploaded image of other users could obtain its geolocation, device, and software version data etc (if present. The issue is fixed in version 2.0."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.5,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-200","description":"{\"CWE-200\":\"Exposure of Sensitive Information to an Unauthorized Actor\"}","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2020-11-11T22:15:14.000Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/puncsky/touchbase.ai/security/advisories/GHSA-hh6j-j73p-cp3h"},{"tags":["x_refsource_MISC"],"url":"https://github.com/puncsky/touchbase.ai/pull/400/commits/69de77b163f6debaeb3f8d1a85367310a40d196f"}],"source":{"advisory":"GHSA-hh6j-j73p-cp3h","discovery":"UNKNOWN"},"title":"Information exposure in touchbase.ai","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2020-26220","STATE":"PUBLIC","TITLE":"Information exposure in touchbase.ai"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"touchbase.ai","version":{"version_data":[{"version_value":"< 2.0"}]}}]},"vendor_name":"puncsky"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"toucbase.ai before version 2.0 leaks information by not stripping exif data from images. Anyone with access to the uploaded image of other users could obtain its geolocation, device, and software version data etc (if present. The issue is fixed in version 2.0."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.5,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"{\"CWE-200\":\"Exposure of Sensitive Information to an Unauthorized Actor\"}"}]}]},"references":{"reference_data":[{"name":"https://github.com/puncsky/touchbase.ai/security/advisories/GHSA-hh6j-j73p-cp3h","refsource":"CONFIRM","url":"https://github.com/puncsky/touchbase.ai/security/advisories/GHSA-hh6j-j73p-cp3h"},{"name":"https://github.com/puncsky/touchbase.ai/pull/400/commits/69de77b163f6debaeb3f8d1a85367310a40d196f","refsource":"MISC","url":"https://github.com/puncsky/touchbase.ai/pull/400/commits/69de77b163f6debaeb3f8d1a85367310a40d196f"}]},"source":{"advisory":"GHSA-hh6j-j73p-cp3h","discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T15:49:07.176Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/puncsky/touchbase.ai/security/advisories/GHSA-hh6j-j73p-cp3h"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/puncsky/touchbase.ai/pull/400/commits/69de77b163f6debaeb3f8d1a85367310a40d196f"}]}]},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2020-26220","datePublished":"2020-11-11T22:15:14.000Z","dateReserved":"2020-10-01T00:00:00.000Z","dateUpdated":"2024-08-04T15:49:07.176Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}