A vulnerability has been identified in Polarion Subversion Webclient (All versions). The Polarion subversion web application does not filter user input in a way that prevents Cross-Site Scripting. If a user is enticed into passing specially crafted, malicious input to the web client (e.g. by clicking on a malicious URL with embedded JavaScript), then JavaScript code can be returned and may then be executed by the user’s client. Various actions could be triggered by running malicious JavaScript code.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-436520.pdf | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-436520.pdf | Vendor Advisory |
Configurations
History
21 Nov 2024, 05:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-436520.pdf - Vendor Advisory |
Information
Published : 2020-09-09 19:15
Updated : 2024-11-21 05:06
NVD link : CVE-2020-15788
Mitre link : CVE-2020-15788
CVE.ORG link : CVE-2020-15788
JSON object : View
Products Affected
siemens
- polarion_subversion_webclient