Vulnerability Details : CVE-2020-11000
GreenBrowser before version 1.2 has a vulnerability where apps that rely on URL Parsing to verify that a given URL is pointing to a trust server may be susceptible to many different ways to get URL parsing and verification wrong, which allows an attacker to circumvent the access control. This problem has been patched in version 1.2.
Products affected by CVE-2020-11000
- cpe:2.3:a:greenbrowser_project:greenbrowser:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-11000
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 49 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-11000
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST | |
5.7
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
2.1
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2020-11000
-
The product uses a handler for a custom URL scheme, but it does not properly restrict which actors can invoke the handler using the scheme.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2020-11000
-
https://github.com/luchua-bc/GreenBrowser/security/advisories/GHSA-7x3j-7x5w-8g7w
Improper URL validation · Advisory · luchua-bc/GreenBrowser · GitHubThird Party Advisory
-
https://github.com/luchua-bc/GreenBrowser/commit/5e257e0db4f2a08cf05f00756e5961ee873e481b
Address the issue related to URL validation · luchua-bc/GreenBrowser@5e257e0 · GitHubPatch;Third Party Advisory
Jump to