Vulnerability Details : CVE-2020-9013
Potential exploit
Arvato Skillpipe 3.0 allows attackers to bypass intended print restrictions by deleting <div id="watermark"> from the HTML source code.
Vulnerability category: Input validation
Products affected by CVE-2020-9013
- cpe:2.3:a:arvato:skillpipe:3.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-9013
0.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 47 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-9013
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:P/A:N |
8.0
|
2.9
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
2.8
|
1.4
|
NIST |
CWE ids for CVE-2020-9013
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-9013
-
https://twitter.com/GerardFuguet/status/1228462263188758529
Gerard Fuguet Morales on Twitter: "In 2017 I reported a vulnerability in #skillpipe that let you strip the watermark from #MOC. At present, #Microsoft students can achieve it plus #AdblockPlus to "SemThird Party Advisory
-
https://www.youtube.com/watch?v=Ok1UmRFWoLY
YouTubeThird Party Advisory
-
https://www.exploit-db.com/docs/48175
Exploit;Third Party Advisory;VDB Entry
Jump to