3.5
CVSSv2

CVE-2020-1696

Published: 20/03/2020 Updated: 12/02/2023
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.4 | Impact Score: 2.7 | Exploitability Score: 2.3
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

A flaw was found in the all pki-core 10.x.x versions, where Token Processing Service (TPS) where it did not properly sanitize Profile IDs, enabling a Stored Cross-Site Scripting (XSS) vulnerability when the profile ID is printed. An attacker with sufficient permissions could trick an authenticated victim into executing a specially crafted Javascript code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat certificate system 9.0

redhat certificate system 10.0

dogtagpki dogtagpki

Vendor Advisories

Debian Bug report logs - #1014854 dogtag-pki: CVE-2020-1696 Package: src:dogtag-pki; Maintainer for src:dogtag-pki is Debian FreeIPA Team <pkg-freeipa-devel@alioth-listsdebiannet>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Wed, 13 Jul 2022 09:27:01 UTC Severity: important Tags: security Reply or ...