Vulnerability Description
JsLink in Webswing before 2.6.12 LTS, and 2.7.x and 20.x before 20.1, allows remote code execution.
CVSS Score
9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Webswing | Webswing | < 2.6.12 |
References
- https://bitbucket.org/meszarv/webswing/issues/375/webswing-jslink-mechanism-remoIssue TrackingThird Party Advisory
- https://www.webswing.org/docs/2.6/discover/release_notes.html#release-notes-2-6-Release NotesVendor Advisory
- https://bitbucket.org/meszarv/webswing/issues/375/webswing-jslink-mechanism-remoIssue TrackingThird Party Advisory
- https://www.webswing.org/docs/2.6/discover/release_notes.html#release-notes-2-6-Release NotesVendor Advisory
FAQ
What is CVE-2020-11103?
CVE-2020-11103 is a vulnerability with a CVSS score of 9.8 (CRITICAL). JsLink in Webswing before 2.6.12 LTS, and 2.7.x and 20.x before 20.1, allows remote code execution.
How severe is CVE-2020-11103?
CVE-2020-11103 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-11103?
Check the references section above for vendor advisories and patch information. Affected products include: Webswing Webswing.