Vulnerability Description
Immuta v2.8.2 accepts user-supplied project names without properly sanitizing the input, allowing attackers to inject arbitrary HTML content that is rendered as part of the application. An attacker could leverage this to redirect application users to a phishing website in an attempt to steal credentials.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Immuta | Immuta | 2.8.2 |
Related Weaknesses (CWE)
References
- https://labs.bishopfox.com/advisoriesExploitThird Party Advisory
- https://labs.bishopfox.com/advisories/immuta-version-2.8.2Release NotesThird Party Advisory
- https://www.immuta.com/Product
- https://labs.bishopfox.com/advisoriesExploitThird Party Advisory
- https://labs.bishopfox.com/advisories/immuta-version-2.8.2Release NotesThird Party Advisory
- https://www.immuta.com/Product
FAQ
What is CVE-2020-15951?
CVE-2020-15951 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Immuta v2.8.2 accepts user-supplied project names without properly sanitizing the input, allowing attackers to inject arbitrary HTML content that is rendered as part of the application. An attacker co...
How severe is CVE-2020-15951?
CVE-2020-15951 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-15951?
Check the references section above for vendor advisories and patch information. Affected products include: Immuta Immuta.