Search for vulnerabilities
Vulnerability details: VCID-pk5w-rtgg-aaap
Vulnerability ID VCID-pk5w-rtgg-aaap
Aliases CVE-2020-28948
GHSA-jh5x-hfhg-78jq
Summary Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-28948.html
cvssv3 7.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28948.json
epss 0.06778 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.06778 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.06778 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.06778 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.06778 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.06778 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.06778 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.06778 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.06778 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.06778 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.19409 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.19409 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.19409 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.19409 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.72659 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.72659 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.72659 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.72659 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.74454 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.75558 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.75558 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.75558 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.75558 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.7637 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
epss 0.78143 https://api.first.org/data/v1/epss?cve=CVE-2020-28948
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1904001
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28948
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28949
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-jh5x-hfhg-78jq
cvssv3.1 7.1 https://github.com/pear/Archive_Tar
generic_textual HIGH https://github.com/pear/Archive_Tar
cvssv3.1 7.8 https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da
generic_textual HIGH https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da
cvssv3.1 7.8 https://github.com/pear/Archive_Tar/issues/33
generic_textual HIGH https://github.com/pear/Archive_Tar/issues/33
cvssv3.1 7.8 https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html
cvssv3.1 7.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR
cvssv3.1 7.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B
cvssv3.1 7.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437
cvssv3.1 7.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT
cvssv3.1 7.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP
cvssv3.1 7.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2020-28948
cvssv3 7.8 https://nvd.nist.gov/vuln/detail/CVE-2020-28948
cvssv3.1 7.8 https://nvd.nist.gov/vuln/detail/CVE-2020-28948
cvssv3.1 7.5 https://security.gentoo.org/glsa/202101-23
generic_textual HIGH https://security.gentoo.org/glsa/202101-23
generic_textual Medium https://ubuntu.com/security/notices/USN-4654-1
cvssv3.1 7.8 https://www.debian.org/security/2020/dsa-4817
generic_textual HIGH https://www.debian.org/security/2020/dsa-4817
cvssv3.1 7.8 https://www.drupal.org/sa-core-2020-013
generic_textual HIGH https://www.drupal.org/sa-core-2020-013
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-28948.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28948.json
https://api.first.org/data/v1/epss?cve=CVE-2020-28948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28949
https://github.com/pear/Archive_Tar
https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da
https://github.com/pear/Archive_Tar/issues/33
https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/
https://security.gentoo.org/glsa/202101-23
https://ubuntu.com/security/notices/USN-4654-1
https://www.debian.org/security/2020/dsa-4817
https://www.drupal.org/sa-core-2020-013
1904001 https://bugzilla.redhat.com/show_bug.cgi?id=1904001
976108 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976108
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
cpe:2.3:a:php:archive_tar:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:archive_tar:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
CVE-2020-28948 https://nvd.nist.gov/vuln/detail/CVE-2020-28948
GHSA-jh5x-hfhg-78jq https://github.com/advisories/GHSA-jh5x-hfhg-78jq
RHSA-2022:6541 https://access.redhat.com/errata/RHSA-2022:6541
RHSA-2022:6542 https://access.redhat.com/errata/RHSA-2022:6542
RHSA-2022:7340 https://access.redhat.com/errata/RHSA-2022:7340
USN-4654-1 https://usn.ubuntu.com/4654-1/
USN-6981-1 https://usn.ubuntu.com/6981-1/
USN-6981-2 https://usn.ubuntu.com/6981-2/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28948.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/pear/Archive_Tar
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/pear/Archive_Tar/issues/33
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2020-28948
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-28948
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-28948
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://security.gentoo.org/glsa/202101-23
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.debian.org/security/2020/dsa-4817
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.drupal.org/sa-core-2020-013
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.94058
EPSS Score 0.06778
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.