Arvato Skillpipe 3.0 allows attackers to bypass intended print restrictions by deleting <div id="watermark"> from the HTML source code.
References
Link | Resource |
---|---|
https://twitter.com/GerardFuguet/status/1228462263188758529 | Third Party Advisory |
https://www.exploit-db.com/docs/48175 | Exploit Third Party Advisory VDB Entry |
https://www.youtube.com/watch?v=Ok1UmRFWoLY | Third Party Advisory |
https://twitter.com/GerardFuguet/status/1228462263188758529 | Third Party Advisory |
https://www.exploit-db.com/docs/48175 | Exploit Third Party Advisory VDB Entry |
https://www.youtube.com/watch?v=Ok1UmRFWoLY | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://twitter.com/GerardFuguet/status/1228462263188758529 - Third Party Advisory | |
References | () https://www.exploit-db.com/docs/48175 - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.youtube.com/watch?v=Ok1UmRFWoLY - Third Party Advisory |
Information
Published : 2020-02-16 21:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-9013
Mitre link : CVE-2020-9013
CVE.ORG link : CVE-2020-9013
JSON object : View
Products Affected
arvato
- skillpipe
CWE
CWE-20
Improper Input Validation