Vulnerability Description
Content Injection vulnerability in Tenable Nessus prior to 8.5.0 may allow an authenticated, local attacker to exploit this vulnerability by convincing another targeted Nessus user to view a malicious URL and use Nessus to send fraudulent messages. Successful exploitation could allow the authenticated adversary to inject arbitrary text into the feed status, which will remain saved post session expiration.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenable | Nessus | < 8.5.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/109025Third Party Advisory
- https://www.tenable.com/security/tns-2019-04Vendor Advisory
- http://www.securityfocus.com/bid/109025Third Party Advisory
- https://www.tenable.com/security/tns-2019-04Vendor Advisory
FAQ
What is CVE-2019-3962?
CVE-2019-3962 is a vulnerability with a CVSS score of 3.3 (LOW). Content Injection vulnerability in Tenable Nessus prior to 8.5.0 may allow an authenticated, local attacker to exploit this vulnerability by convincing another targeted Nessus user to view a malicious...
How severe is CVE-2019-3962?
CVE-2019-3962 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-3962?
Check the references section above for vendor advisories and patch information. Affected products include: Tenable Nessus.