Lucene search

K
cve[email protected]CVE-2020-36660
HistoryFeb 06, 2023 - 5:15 p.m.

CVE-2020-36660

2023-02-0617:15:09
CWE-200
web.nvd.nist.gov
49
vulnerability
paxswill
eve ship replacement program
0.12.11
information disclosure
remote attack
upgrade
nvd
cve-2020-36660

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.4%

A vulnerability was found in paxswill EVE Ship Replacement Program 0.12.11. It has been rated as problematic. This issue affects some unknown processing of the file src/evesrp/views/api.py of the component User Information Handler. The manipulation leads to information disclosure. The attack may be initiated remotely. Upgrading to version 0.12.12 is able to address this issue. The patch is named 9e03f68e46e85ca9c9694a6971859b3ee66f0240. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220211.

Affected configurations

Vulners
NVD
Node
eve_ship_replacement_program_projecteve_ship_replacement_programMatch0.12.11
VendorProductVersionCPE
eve_ship_replacement_program_projecteve_ship_replacement_program0.12.11cpe:2.3:a:eve_ship_replacement_program_project:eve_ship_replacement_program:0.12.11:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "paxswill",
    "product": "EVE Ship Replacement Program",
    "versions": [
      {
        "version": "0.12.11",
        "status": "affected"
      }
    ],
    "modules": [
      "User Information Handler"
    ]
  }
]

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.4%

Related for CVE-2020-36660