Vulnerability Description
ObjectPlanet Opinio before 7.15 allows XXE attacks via three steps: modify a .css file to have <!ENTITY content, create a .xml file for a generic survey template (containing a link to this .css file), and import this .xml file at the survey/admin/folderSurvey.do?action=viewImportSurvey['importFile'] URI. The XXE can then be triggered at a admin/preview.do?action=previewSurvey&surveyId= URI.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Objectplanet | Opinio | < 7.15 |
Related Weaknesses (CWE)
References
- https://packetstormsecurity.com/files/163707/ObjectPlanet-Opinio-7.13-7.14-XML-IExploitThird Party AdvisoryVDB Entry
- https://www.objectplanet.com/opinio/changelog.htmlRelease NotesVendor Advisory
- https://packetstormsecurity.com/files/163707/ObjectPlanet-Opinio-7.13-7.14-XML-IExploitThird Party AdvisoryVDB Entry
- https://www.objectplanet.com/opinio/changelog.htmlRelease NotesVendor Advisory
FAQ
What is CVE-2020-26564?
CVE-2020-26564 is a vulnerability with a CVSS score of 6.5 (MEDIUM). ObjectPlanet Opinio before 7.15 allows XXE attacks via three steps: modify a .css file to have <!ENTITY content, create a .xml file for a generic survey template (containing a link to this .css file),...
How severe is CVE-2020-26564?
CVE-2020-26564 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-26564?
Check the references section above for vendor advisories and patch information. Affected products include: Objectplanet Opinio.