Lucene search

K
cveGitHub_MCVE-2020-26251
HistoryDec 18, 2020 - 6:15 p.m.

CVE-2020-26251

2020-12-1818:15:12
CWE-346
GitHub_M
web.nvd.nist.gov
25
2
open zaak
cve-2020-26251
cross-origin-resource-sharing
security vulnerability
case management
dutch approach
data security
ajax calls
cors policy

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

4.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

4.7

Confidence

High

EPSS

0.001

Percentile

34.7%

Open Zaak is a modern, open-source data- and services-layer to enable zaakgericht werken, a Dutch approach to case management. In Open Zaak before version 1.3.3 the Cross-Origin-Resource-Sharing policy in Open Zaak is currently wide open - every client is allowed. This allows evil.com to run scripts that perform AJAX calls to known Open Zaak installations, and the browser will not block these. This was intended to only apply to development machines running on localhost/127.0.0.1. Open Zaak 1.3.3 disables CORS by default, while it can be opted-in through environment variables. The vulnerability does not actually seem exploitable because: a) The session cookie has a Same-Site: Lax policy which prevents it from being sent along in Cross-Origin requests. b) All pages that give access to (production) data are login-protected c) Access-Control-Allow-Credentials is set to false d) CSRF checks probably block the remote origin, since they’re not explicitly added to the trusted allowlist.

Affected configurations

Nvd
Vulners
Node
openzaakopen_zaakRange<1.3.3
VendorProductVersionCPE
openzaakopen_zaak*cpe:2.3:a:openzaak:open_zaak:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "open-zaak",
    "vendor": "open-zaak",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.3.3"
      }
    ]
  }
]

Social References

More

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

4.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

4.7

Confidence

High

EPSS

0.001

Percentile

34.7%

Related for CVE-2020-26251