{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2020-36634","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2022-12-27T12:19:39.466Z","datePublished":"2022-12-27T12:21:17.013Z","dateUpdated":"2024-11-19T19:47:14.378Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2022-12-27T12:21:17.013Z"},"title":"Indeed Engineering util ViewExportedVariablesServlet.java appendTo cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"Indeed Engineering","product":"util","versions":[{"version":"1.0.0","status":"affected"},{"version":"1.0.1","status":"affected"},{"version":"1.0.2","status":"affected"},{"version":"1.0.3","status":"affected"},{"version":"1.0.4","status":"affected"},{"version":"1.0.5","status":"affected"},{"version":"1.0.6","status":"affected"},{"version":"1.0.7","status":"affected"},{"version":"1.0.8","status":"affected"},{"version":"1.0.9","status":"affected"},{"version":"1.0.10","status":"affected"},{"version":"1.0.11","status":"affected"},{"version":"1.0.12","status":"affected"},{"version":"1.0.13","status":"affected"},{"version":"1.0.14","status":"affected"},{"version":"1.0.15","status":"affected"},{"version":"1.0.16","status":"affected"},{"version":"1.0.17","status":"affected"},{"version":"1.0.18","status":"affected"},{"version":"1.0.19","status":"affected"},{"version":"1.0.20","status":"affected"},{"version":"1.0.21","status":"affected"},{"version":"1.0.22","status":"affected"},{"version":"1.0.23","status":"affected"},{"version":"1.0.24","status":"affected"},{"version":"1.0.25","status":"affected"},{"version":"1.0.26","status":"affected"},{"version":"1.0.27","status":"affected"},{"version":"1.0.28","status":"affected"},{"version":"1.0.29","status":"affected"},{"version":"1.0.30","status":"affected"},{"version":"1.0.31","status":"affected"},{"version":"1.0.32","status":"affected"},{"version":"1.0.33","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in Indeed Engineering util up to 1.0.33. Affected is the function visit/appendTo of the file varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.34 is able to address this issue. The name of the patch is c0952a9db51a880e9544d9fac2a2218a6bfc9c63. It is recommended to upgrade the affected component. VDB-216882 is the identifier assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in Indeed Engineering util bis 1.0.33 entdeckt. Es geht dabei um die Funktion visit/appendTo der Datei varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java. Mittels Manipulieren mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Ein Aktualisieren auf die Version 1.0.34 vermag dieses Problem zu lösen. Der Patch wird als c0952a9db51a880e9544d9fac2a2218a6bfc9c63 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":2.6,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2.6,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}}],"timeline":[{"time":"2022-12-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2022-12-27T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2022-12-27T13:26:14.000Z","lang":"en","value":"VulDB last update"}],"references":[{"url":"https://vuldb.com/?id.216882","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.216882","tags":["signature","permissions-required"]},{"url":"https://github.com/indeedeng/util/commit/c0952a9db51a880e9544d9fac2a2218a6bfc9c63","tags":["patch"]},{"url":"https://github.com/indeedeng/util/releases/tag/published%2F1.0.34","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T17:30:08.391Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.216882","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.216882","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/indeedeng/util/commit/c0952a9db51a880e9544d9fac2a2218a6bfc9c63","tags":["patch","x_transferred"]},{"url":"https://github.com/indeedeng/util/releases/tag/published%2F1.0.34","tags":["patch","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-02-29T20:33:39.208280Z","id":"CVE-2020-36634","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-19T19:47:14.378Z"}}]}}