CVE-2020-36634

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-36634
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-36634.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-36634
Published
2022-12-27T13:15:11Z
Modified
2025-01-15T01:45:35.088316Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability classified as problematic has been found in Indeed Engineering util up to 1.0.33. Affected is the function visit/appendTo of the file varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.34 is able to address this issue. The name of the patch is c0952a9db51a880e9544d9fac2a2218a6bfc9c63. It is recommended to upgrade the affected component. VDB-216882 is the identifier assigned to this vulnerability.

References

Affected packages

Git / github.com/indeedeng/util

Affected ranges

Type
GIT
Repo
https://github.com/indeedeng/util
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

published/0.*

published/0.0.1-experimental-gradle

published/1.*

published/1.0.0
published/1.0.1
published/1.0.29
published/1.0.30
published/1.0.31
published/1.0.32
published/1.0.33

util-parent-1.*

util-parent-1.0.0
util-parent-1.0.12
util-parent-1.0.13
util-parent-1.0.14
util-parent-1.0.15
util-parent-1.0.16
util-parent-1.0.17
util-parent-1.0.18
util-parent-1.0.19
util-parent-1.0.20
util-parent-1.0.21
util-parent-1.0.22
util-parent-1.0.23
util-parent-1.0.23-internal-20161102150821
util-parent-1.0.24
util-parent-1.0.25
util-parent-1.0.9