CVE-2020-13651
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/06/2020
Last modified:
21/07/2021
Description
An issue was discovered in DigDash 2018R2 before p20200528, 2019R1 before p20200421, and 2019R2 before p20200430. It allows a user to provide data that will be used to generate the JNLP file used by a client to obtain the right Java application. By providing an attacker-controlled URL, the client will obtain a rogue JNLP file specifying the installation of malicious JAR archives and executed with full privileges on the client computer.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:digdash:digdash:2018r2:-:*:*:*:*:*:* | ||
cpe:2.3:a:digdash:digdash:2019r1:-:*:*:*:*:*:* | ||
cpe:2.3:a:digdash:digdash:2019r2:-:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page