Lucene search

K
cve[email protected]CVE-2020-7354
HistoryJun 25, 2020 - 6:15 p.m.

CVE-2020-7354

2020-06-2518:15:12
CWE-79
web.nvd.nist.gov
14
cve
2020
7354
cross-site scripting
xss
vulnerability
rapid7
metasploit pro

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N

5.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.6%

Cross-site Scripting (XSS) vulnerability in the ‘host’ field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target to store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7355, which describes a similar issue, but involving the generated ‘notes’ field of a discovered scan asset.

Affected configurations

NVD
Node
rapid7metasploitRange<4.17.1pro
OR
rapid7metasploitMatch4.17.1-pro
OR
rapid7metasploitMatch4.17.120170221pro
OR
rapid7metasploitMatch4.17.120170323pro
OR
rapid7metasploitMatch4.17.120170405pro
OR
rapid7metasploitMatch4.17.120170419pro
OR
rapid7metasploitMatch4.17.120170510pro
OR
rapid7metasploitMatch4.17.120170518pro
OR
rapid7metasploitMatch4.17.120170530pro
OR
rapid7metasploitMatch4.17.120170613pro
OR
rapid7metasploitMatch4.17.120170627pro
OR
rapid7metasploitMatch4.17.120170718pro
OR
rapid7metasploitMatch4.17.120170731pro
OR
rapid7metasploitMatch4.17.120170816pro
OR
rapid7metasploitMatch4.17.120170828pro
OR
rapid7metasploitMatch4.17.120170914pro
OR
rapid7metasploitMatch4.17.120170926pro
OR
rapid7metasploitMatch4.17.120171009pro
OR
rapid7metasploitMatch4.17.120171030pro
OR
rapid7metasploitMatch4.17.120171115pro
OR
rapid7metasploitMatch4.17.120171129pro
OR
rapid7metasploitMatch4.17.120171206pro
OR
rapid7metasploitMatch4.17.120171220pro
OR
rapid7metasploitMatch4.17.120180108pro
OR
rapid7metasploitMatch4.17.120180124pro
OR
rapid7metasploitMatch4.17.120180206pro
OR
rapid7metasploitMatch4.17.120180301pro
OR
rapid7metasploitMatch4.17.120180312pro
OR
rapid7metasploitMatch4.17.120180327pro
OR
rapid7metasploitMatch4.17.120180410pro
OR
rapid7metasploitMatch4.17.120180501pro
OR
rapid7metasploitMatch4.17.120180511pro
OR
rapid7metasploitMatch4.17.120180526pro
OR
rapid7metasploitMatch4.17.120180618pro
OR
rapid7metasploitMatch4.17.120180704pro
OR
rapid7metasploitMatch4.17.120180716pro
OR
rapid7metasploitMatch4.17.120180727pro
OR
rapid7metasploitMatch4.17.120180813pro
OR
rapid7metasploitMatch4.17.120180827pro
OR
rapid7metasploitMatch4.17.120180907pro
OR
rapid7metasploitMatch4.17.120180924pro
OR
rapid7metasploitMatch4.17.120181009pro
OR
rapid7metasploitMatch4.17.120181022pro
OR
rapid7metasploitMatch4.17.120181105pro
OR
rapid7metasploitMatch4.17.120181130pro
OR
rapid7metasploitMatch4.17.120181215pro
OR
rapid7metasploitMatch4.17.120190108pro
OR
rapid7metasploitMatch4.17.120190118pro
OR
rapid7metasploitMatch4.17.120190201pro
OR
rapid7metasploitMatch4.17.120190219pro
OR
rapid7metasploitMatch4.17.120190303pro
OR
rapid7metasploitMatch4.17.120190319pro
OR
rapid7metasploitMatch4.17.120190331pro
OR
rapid7metasploitMatch4.17.120190416pro
OR
rapid7metasploitMatch4.17.120190426pro
OR
rapid7metasploitMatch4.17.120190513pro
OR
rapid7metasploitMatch4.17.120190603pro
OR
rapid7metasploitMatch4.17.120190607pro
OR
rapid7metasploitMatch4.17.120190626pro
OR
rapid7metasploitMatch4.17.120190722pro
OR
rapid7metasploitMatch4.17.120190805pro
OR
rapid7metasploitMatch4.17.120190819pro
OR
rapid7metasploitMatch4.17.120190910pro
OR
rapid7metasploitMatch4.17.120190930pro
OR
rapid7metasploitMatch4.17.120191014pro
OR
rapid7metasploitMatch4.17.120191030pro
OR
rapid7metasploitMatch4.17.120191108pro
OR
rapid7metasploitMatch4.17.120191209pro
OR
rapid7metasploitMatch4.17.120200113pro
OR
rapid7metasploitMatch4.17.120200122pro
OR
rapid7metasploitMatch4.17.120200131pro
OR
rapid7metasploitMatch4.17.120200218pro
OR
rapid7metasploitMatch4.17.120200302pro
OR
rapid7metasploitMatch4.17.120200318pro
OR
rapid7metasploitMatch4.17.120200330pro
OR
rapid7metasploitMatch4.17.120200413pro

CNA Affected

[
  {
    "product": "Metasploit Pro",
    "vendor": "Rapid7",
    "versions": [
      {
        "lessThanOrEqual": "4.17.1-20200427",
        "status": "affected",
        "version": "4.17.1-20200427",
        "versionType": "custom"
      }
    ]
  }
]

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N

5.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.6%

Related for CVE-2020-7354