3.5
CVSSv2

CVE-2020-13889

Published: 06/06/2020 Updated: 09/06/2020
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.4 | Impact Score: 2.7 | Exploitability Score: 2.3
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

showAlert() in the administration panel in Bludit 3.12.0 allows XSS.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

bludit bludit 3.12.0

Github Repositories

CVE-2020-13889. The admin page of bludit have an XSS in the showAlert() function that dont sanitize user input leading them to execute an malicious code.

Author: Andre k Lorenci Contact: avlorenci@gmailcom CVE-2020-13889 Hello, this vulnerability consists in a function called showAlert() in the administration panel of bludit,that when accessed in DOM, allows users define the text to be popped up in the message box But this function dont have any sanatization and the user can inject any javascript code or even HTML in the page

CVE-2020-13889. The admin page of bludit have an XSS in the showAlert() function that dont sanitize user input leading them to execute an malicious code.

Author: Andre k Lorenci Contact: avlorenci@gmailcom CVE-2020-13889 Hello, this vulnerability consists in a function called showAlert() in the administration panel of bludit,that when accessed in DOM, allows users define the text to be popped up in the message box But this function dont have any sanatization and the user can inject any javascript code or even HTML in the page

CVE-2020-13889. The admin page of bludit have an XSS in the showAlert() function that dont sanitize user input leading them to execute an malicious code.

Author: Andre k Lorenci Contact: avlorenci@gmailcom CVE-2020-13889 Hello, this vulnerability consists in a function called showAlert() in the administration panel of bludit,that when accessed in DOM, allows users define the text to be popped up in the message box But this function dont have any sanatization and the user can inject any javascript code or even HTML in the page