4.3
CVSSv2

CVE-2020-7355

Published: 25/06/2020 Updated: 06/07/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site Scripting (XSS) vulnerability in the 'notes' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7354, which describes a similar issue, but involving the generated 'host' field of a discovered scan asset.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rapid7 metasploit

rapid7 metasploit 4.17.1

Github Repositories

Damn Vulnerable Application Scanner

Damn Vulnerable Application Scanner (DVAS) This repository contains a collection of web-based (vulnerable) security scanners, including (but not limited to) the vulnerabilities from "Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners" [1] DVAS also contains a simulation of CVE-2020-7354 and CVE-2020-7355 for Metasploit Pro [2] Getting Started

An HTTP Response fuzzer to find Vulnerabilities in Security Scanners

RevOK We see the targets of our scan as passive entities, and this leads to underestimating the risk of performing a scan However, the tools we use to scan are not immune to vulnerabilities Testing these bugs is often hard since they require a dedicated testing infrastructure: RevOK supports analysts by simulating a malicious target and by tracking data in the security scanne