Vulnerability Details : CVE-2020-7764
This affects the package find-my-way before 2.2.5, from 3.0.0 and before 3.0.5. It accepts the Accept-Version' header by default, and if versioned routes are not being used, this could lead to a denial of service. Accept-Version can be used as an unkeyed header in a cache poisoning attack.
Vulnerability category: Denial of service
Products affected by CVE-2020-7764
- cpe:2.3:a:find-my-way_project:find-my-way:*:*:*:*:*:*:*:*
- cpe:2.3:a:find-my-way_project:find-my-way:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-7764
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-7764
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.2
|
3.6
|
Snyk |
CWE ids for CVE-2020-7764
-
The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed by those entities that are at the ultimate destination.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-7764
-
https://github.com/delvedor/find-my-way/commit/ab408354690e6b9cf3c4724befb3b3fa4bb90aac
Enable versioning on demand (#172) · delvedor/find-my-way@ab40835 · GitHubPatch;Third Party Advisory
-
https://snyk.io/vuln/SNYK-JS-FINDMYWAY-1038269
Web Cache Poisoning in find-my-way | SnykThird Party Advisory
Jump to