ID

VAR-202104-0866


CVE

CVE-2020-9995


TITLE

Apple macOS Server  Cross-site scripting vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-017280

DESCRIPTION

An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in macOS Server 5.11. Processing a maliciously crafted URL may lead to an open redirect or cross site scripting. Apple macOS Server contains a cross-site scripting vulnerability and an open redirect vulnerability.Information may be obtained and information may be tampered with. Apple MacOS Server is a server-side version of the operating system of Apple Inc. in the United States. Information about the security content is also available at https://support.apple.com/HT211932. CVE-2020-9995: Rajpal Arora (@whacktohack), Rohan Sharma (r0hanSH) Additional recognition macOS Server We would like to acknowledge Patrick Schlangen for their assistance. Installation note: macOS Server 5.11 may be obtained from the Mac App Store. Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAl/YBp0ACgkQZcsbuWJ6 jjDv2xAAjUAACv8tKX8uZA+7Kuq4FibiTyb/B3arSkN5SJA99T6AsThRauddvn96 RAZw2J8/BkgCLHEo+rB1DXHLoiq94IiECMCWUtSKk8fgMovEL/g+iO96+iwQBC/G ZNBvM88bvfvoEhXfgGxAG3oclNInz0QlvY6bMhyDz4/CUfS+YlQb9ujzYV2EWfin LBfKGOR4q8V7Hsnl6CC/4nx2TKaniKKp6hYnztftIcCDw5eJinIq8O476CyCUoaT 9UqTGUxw51Se0oc490xdufVi/7dSrmbJbiWA6KrJj58IcC6e6VU+ziByhkpX9udh qBuFVWxynrJVgsxagYA7x/kvaEG+oDc+Otf4h6ARJOQnM/+UeizqDKbRJZjSwd2y Efr+C92p3qM7OkQYAmBLUub1pgMLbNhlIZvb/4555Bp7s27fEuzlKniIK5406Zro zcQ+4G3pG6rG02WAHiAV6dPvDqp+YeCdt8g4zOw7iofDulYz5rDPinfm3bKd2oes wOnsK+JqNfmSAbSakrNKC3Ab/UHMkchji38QSScnMHdh0secKRHEcystdy4WKSVy 4ylKpkDnVnOhyYvkuMhZXSpuxKdO9bZqd1m5Usr6PR9Gf4WQTfgoyyzXP3g3u/zx WIsYeR7e7VzR3+EGpgPKmhrbiBfL9eVkceQo1jR0Zzkw1QFsIgI=UWhb -----END PGP SIGNATURE-----

Trust: 1.89

sources: NVD: CVE-2020-9995 // JVNDB: JVNDB-2020-017280 // VULHUB: VHN-188120 // VULMON: CVE-2020-9995 // PACKETSTORM: 160544

AFFECTED PRODUCTS

vendor:applemodel:macos serverscope:ltversion:5.11

Trust: 1.0

vendor:アップルmodel:macos serverscope:ltversion:(macos big sur)

Trust: 0.8

vendor:アップルmodel:macos serverscope:eqversion:macos server ( old os x server) 5.11

Trust: 0.8

vendor:アップルmodel:macos serverscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-017280 // NVD: CVE-2020-9995

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-9995
value: MEDIUM

Trust: 1.0

NVD: CVE-2020-9995
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202012-1055
value: MEDIUM

Trust: 0.6

VULHUB: VHN-188120
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-9995
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-9995
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-188120
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-9995
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.7
version: 3.1

Trust: 1.0

NVD: CVE-2020-9995
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-188120 // VULMON: CVE-2020-9995 // JVNDB: JVNDB-2020-017280 // CNNVD: CNNVD-202012-1055 // NVD: CVE-2020-9995

PROBLEMTYPE DATA

problemtype:CWE-601

Trust: 1.1

problemtype:CWE-79

Trust: 1.1

problemtype:Open redirect (CWE-601) [NVD evaluation ]

Trust: 0.8

problemtype: Cross-site scripting (CWE-79) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-188120 // JVNDB: JVNDB-2020-017280 // NVD: CVE-2020-9995

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202012-1055

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 160544 // CNNVD: CNNVD-202012-1055

PATCH

title:HT211932 Apple  Security updateurl:https://support.apple.com/en-us/HT211932

Trust: 0.8

title:Apple Macos Server Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=137454

Trust: 0.6

sources: JVNDB: JVNDB-2020-017280 // CNNVD: CNNVD-202012-1055

EXTERNAL IDS

db:NVDid:CVE-2020-9995

Trust: 3.5

db:PACKETSTORMid:160544

Trust: 0.8

db:JVNid:JVNVU95288122

Trust: 0.8

db:JVNDBid:JVNDB-2020-017280

Trust: 0.8

db:AUSCERTid:ESB-2020.4402

Trust: 0.6

db:CNNVDid:CNNVD-202012-1055

Trust: 0.6

db:VULHUBid:VHN-188120

Trust: 0.1

db:VULMONid:CVE-2020-9995

Trust: 0.1

sources: VULHUB: VHN-188120 // VULMON: CVE-2020-9995 // JVNDB: JVNDB-2020-017280 // PACKETSTORM: 160544 // CNNVD: CNNVD-202012-1055 // NVD: CVE-2020-9995

REFERENCES

url:https://support.apple.com/en-us/ht211932

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-9995

Trust: 1.5

url:https://jvn.jp/vu/jvnvu95288122/

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.4402/

Trust: 0.6

url:https://packetstormsecurity.com/files/160544/apple-security-advisory-2020-12-14-9.html

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/601.html

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/193052

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://support.apple.com/ht211932.

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

sources: VULHUB: VHN-188120 // VULMON: CVE-2020-9995 // JVNDB: JVNDB-2020-017280 // PACKETSTORM: 160544 // CNNVD: CNNVD-202012-1055 // NVD: CVE-2020-9995

CREDITS

Apple

Trust: 0.7

sources: PACKETSTORM: 160544 // CNNVD: CNNVD-202012-1055

SOURCES

db:VULHUBid:VHN-188120
db:VULMONid:CVE-2020-9995
db:JVNDBid:JVNDB-2020-017280
db:PACKETSTORMid:160544
db:CNNVDid:CNNVD-202012-1055
db:NVDid:CVE-2020-9995

LAST UPDATE DATE

2024-11-23T20:10:09.754000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-188120date:2021-04-07T00:00:00
db:VULMONid:CVE-2020-9995date:2021-04-07T00:00:00
db:JVNDBid:JVNDB-2020-017280date:2022-08-29T02:54:00
db:CNNVDid:CNNVD-202012-1055date:2021-04-08T00:00:00
db:NVDid:CVE-2020-9995date:2024-11-21T05:41:39.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-188120date:2021-04-02T00:00:00
db:VULMONid:CVE-2020-9995date:2021-04-02T00:00:00
db:JVNDBid:JVNDB-2020-017280date:2022-08-29T00:00:00
db:PACKETSTORMid:160544date:2020-12-16T18:04:05
db:CNNVDid:CNNVD-202012-1055date:2020-12-15T00:00:00
db:NVDid:CVE-2020-9995date:2021-04-02T18:15:18.887