CVE-2020-13959
Summary
| CVE | CVE-2020-13959 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-03-10 08:15:00 UTC |
| Updated | 2023-11-07 03:17:00 UTC |
| Description | The default error page for VelocityView in Apache Velocity Tools prior to 3.1 reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. XSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apache | Velocity Tools | All | All | All | All |
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| oss-security - CVE-2020-13959: Velocity Tools XSS Vulnerability | MLIST | www.openwall.com | Mailing List, Third Party Advisory |
| [SECURITY] [DLA 2597-1] velocity-tools security update | MLIST | lists.debian.org | |
| Pony Mail! | CONFIRM | lists.apache.org | Mailing List, Vendor Advisory |
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Vendor Advisory |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Patch, Vendor Advisory |
| Pony Mail! | MLIST | lists.apache.org | |
| Apache Velocity: Multiple vulnerabilities (GLSA 202107-52) — Gentoo security | GENTOO | security.gentoo.org | |
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: This issue was reported and a patch was submitted by Jackson Henry, member of Sakura Samurai.
Legacy QID Mappings
- 178495 Debian Security Update for velocity-tools (DLA 2597-1)
- 199648 Ubuntu Security Notification for Velocity Tools Vulnerability (USN-6282-1)
- 710043 Gentoo Linux Apache Velocity Multiple Vulnerabilities (GLSA 202107-52)
- 981991 Java (maven) Security Update for org.apache.velocity:velocity-tools (GHSA-fh63-4r66-jc7v)