GreenBrowser before version 1.2 has a vulnerability where apps that rely on URL Parsing to verify that a given URL is pointing to a trust server may be susceptible to many different ways to get URL parsing and verification wrong, which allows an attacker to circumvent the access control. This problem has been patched in version 1.2.
References
Link | Resource |
---|---|
https://github.com/luchua-bc/GreenBrowser/commit/5e257e0db4f2a08cf05f00756e5961ee873e481b | Patch Third Party Advisory |
https://github.com/luchua-bc/GreenBrowser/security/advisories/GHSA-7x3j-7x5w-8g7w | Third Party Advisory |
https://github.com/luchua-bc/GreenBrowser/commit/5e257e0db4f2a08cf05f00756e5961ee873e481b | Patch Third Party Advisory |
https://github.com/luchua-bc/GreenBrowser/security/advisories/GHSA-7x3j-7x5w-8g7w | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:56
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 5.7 |
References | () https://github.com/luchua-bc/GreenBrowser/commit/5e257e0db4f2a08cf05f00756e5961ee873e481b - Patch, Third Party Advisory | |
References | () https://github.com/luchua-bc/GreenBrowser/security/advisories/GHSA-7x3j-7x5w-8g7w - Third Party Advisory |
Information
Published : 2020-04-08 17:15
Updated : 2024-11-21 04:56
NVD link : CVE-2020-11000
Mitre link : CVE-2020-11000
CVE.ORG link : CVE-2020-11000
JSON object : View
Products Affected
greenbrowser_project
- greenbrowser
CWE