Vulnerability Details : CVE-2020-20136
QuantConnect Lean versions from 2.3.0.0 to 2.4.0.1 are affected by an insecure deserialization vulnerability due to insecure configuration of TypeNameHandling property in Json.NET library.
Exploit prediction scoring system (EPSS) score for CVE-2020-20136
Probability of exploitation activity in the next 30 days: 0.80%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 81 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2020-20136
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2020-20136
-
The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-20136
-
https://github.com/QuantConnect/Lean/issues/3537
Insecure Deserialization due to insecure TypeNameHandling leads to Code Execution. · Issue #3537 · QuantConnect/Lean · GitHubExploit;Third Party Advisory
Products affected by CVE-2020-20136
- cpe:2.3:a:quantconnect:lean:*:*:*:*:*:*:*:*