Vulnerability Description
A vulnerability was found in Pengu. It has been declared as problematic. Affected by this vulnerability is the function runApp of the file src/index.js. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The name of the patch is aea66f12b8cdfc3c8c50ad6a9c89d8307e9d0a91. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216475.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pengu Project | Pengu | < 2020-11-02 |
Related Weaknesses (CWE)
References
- https://github.com/jtojnar/pengu/commit/aea66f12b8cdfc3c8c50ad6a9c89d8307e9d0a91PatchThird Party Advisory
- https://vuldb.com/?id.216475Third Party AdvisoryVDB Entry
- https://github.com/jtojnar/pengu/commit/aea66f12b8cdfc3c8c50ad6a9c89d8307e9d0a91PatchThird Party Advisory
- https://vuldb.com/?id.216475Third Party AdvisoryVDB Entry
FAQ
What is CVE-2020-36623?
CVE-2020-36623 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A vulnerability was found in Pengu. It has been declared as problematic. Affected by this vulnerability is the function runApp of the file src/index.js. The manipulation leads to cross-site request fo...
How severe is CVE-2020-36623?
CVE-2020-36623 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-36623?
Check the references section above for vendor advisories and patch information. Affected products include: Pengu Project Pengu.