Vulnerability Details : CVE-2020-26583
An issue was discovered in Sage DPW 2020_06_x before 2020_06_002. It allows unauthenticated users to upload JavaScript (in a file) via the expenses claiming functionality. However, to view the file, authentication is required. By exploiting this vulnerability, an attacker can persistently include arbitrary HTML or JavaScript code into the affected web page. The vulnerability can be used to change the contents of the displayed site, redirect to other sites, or steal user credentials. Additionally, users are potential victims of browser exploits and JavaScript malware.
Products affected by CVE-2020-26583
- cpe:2.3:a:sagedpw:sage_dpw:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-26583
0.78%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-26583
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST |
CWE ids for CVE-2020-26583
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-26583
-
https://www.sagedpw.at
Sage DPW | HR-Softwarelösungen für alle UnternehmensgrößenVendor Advisory
-
https://sec-consult.com/en/vulnerability-lab/advisories/
Advisories | SEC ConsultThird Party Advisory
-
https://seclists.org/fulldisclosure/2020/Oct/17
Full Disclosure: SEC Consult SA-20201012-0 :: Reflected Cross-Site Scripting and Unauthenticated Malicious File Upload in Sage DPWMailing List;Third Party Advisory
Jump to