Lucene search

K
cve[email protected]CVE-2020-26287
HistoryDec 29, 2020 - 12:15 a.m.

CVE-2020-26287

2020-12-2900:15:12
CWE-79
web.nvd.nist.gov
49
cve-2020-26287
hedgedoc
injection vulnerability
arbitrary script tags
mermaid diagrams
content security policy
google tag manager
page load execution

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

8.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

8.8 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.4%

HedgeDoc is a collaborative platform for writing and sharing markdown. In HedgeDoc before version 1.7.1 an attacker can inject arbitrary script tags in HedgeDoc notes using mermaid diagrams. Our content security policy prevents loading scripts from most locations, but www.google-analytics.com is allowed. Using Google Tag Manger it is possible to inject arbitrary JavaScript and execute it on page load. Depending on the configuration of the instance, the attacker may not need authentication to create or edit notes. The problem is patched in HedgeDoc 1.7.1. As a workaround one can disallow www.google-analytics.com in the Content-Security-Policy header. Note that other ways to leverage the script tag injection might exist.

Affected configurations

Vulners
NVD
Node
hedgedochedgedocRange<1.7.1
VendorProductVersionCPE
hedgedochedgedoc*cpe:2.3:a:hedgedoc:hedgedoc:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "hedgedoc",
    "vendor": "hedgedoc",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.7.1"
      }
    ]
  }
]

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

8.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

8.8 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.4%

Related for CVE-2020-26287