Vulnerability Description
In all versions of the package jspdf, it is possible to use <<script>script> in order to go over the filtering regex.
CVSS Score
6.3
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Parall | Jspdf | All versions |
Related Weaknesses (CWE)
References
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575255ExploitThird Party Advisory
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-575253ExploitThird Party Advisory
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575254ExploitThird Party Advisory
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575252ExploitThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-JSPDF-568273ExploitThird Party Advisory
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575255ExploitThird Party Advisory
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-575253ExploitThird Party Advisory
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575254ExploitThird Party Advisory
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575252ExploitThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-JSPDF-568273ExploitThird Party Advisory
FAQ
What is CVE-2020-7691?
CVE-2020-7691 is a vulnerability with a CVSS score of 6.3 (MEDIUM). In all versions of the package jspdf, it is possible to use <<script>script> in order to go over the filtering regex.
How severe is CVE-2020-7691?
CVE-2020-7691 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-7691?
Check the references section above for vendor advisories and patch information. Affected products include: Parall Jspdf.