CVE-2020-9343

An issue was discovered in signotec signoPAD-API/Web (formerly Websocket Pad Server) before 3.1.1 on Windows. It is possible to perform a Denial of Service attack because the implementation doesn't limit the parsing of nested JSON structures. If a victim visits an attacker-controlled website, this vulnerability can be exploited via WebSocket data with a deeply nested JSON array.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:signotec:signopad-api\/web:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:40

Type Values Removed Values Added
References () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-053.txt - Exploit, Third Party Advisory () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-053.txt - Exploit, Third Party Advisory

Information

Published : 2020-03-20 03:15

Updated : 2024-11-21 05:40


NVD link : CVE-2020-9343

Mitre link : CVE-2020-9343

CVE.ORG link : CVE-2020-9343


JSON object : View

Products Affected

microsoft

  • windows

signotec

  • signopad-api\/web