Vulnerability Details : CVE-2020-27219
In all version of Eclipse Hawkbit prior to 0.3.0M7, the HTTP 404 (Not Found) JSON response body returned by the REST API may contain unsafe characters within the path attribute. Sending a POST request to a non existing resource will return the full path from the given URL unescaped to the client.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2020-27219
- cpe:2.3:a:eclipse:hawkbit:*:*:*:*:*:*:*:*
- cpe:2.3:a:eclipse:hawkbit:0.3.0:m1:*:*:*:*:*:*
- cpe:2.3:a:eclipse:hawkbit:0.3.0:m2:*:*:*:*:*:*
- cpe:2.3:a:eclipse:hawkbit:0.3.0:m3:*:*:*:*:*:*
- cpe:2.3:a:eclipse:hawkbit:0.3.0:m4:*:*:*:*:*:*
- cpe:2.3:a:eclipse:hawkbit:0.3.0:m5:*:*:*:*:*:*
- cpe:2.3:a:eclipse:hawkbit:0.3.0:m6:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-27219
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-27219
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST |
CWE ids for CVE-2020-27219
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by:
- emo@eclipse.org (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2020-27219
-
https://github.com/eclipse/hawkbit/issues/1067
Mgmt API error page vulnerable to cross-site scripting attack · Issue #1067 · eclipse/hawkbit · GitHubThird Party Advisory
-
https://bugs.eclipse.org/bugs/show_bug.cgi?id=570289
570289 – (CVE-2020-27219) Eclipse hawkBit CVE request: Improper escaping of JSON response fieldVendor Advisory
Jump to