{"api_version":"1","generated_at":"2026-05-13T15:17:57+00:00","cve":"CVE-2020-5283","urls":{"html":"https://cve.report/CVE-2020-5283","api":"https://cve.report/api/cve/CVE-2020-5283.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-5283","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-5283"},"summary":{"title":"CVE-2020-5283","description":"ViewVC before versions 1.1.28 and 1.2.1 has a XSS vulnerability in CVS show_subdir_lastmod support. The impact of this vulnerability is mitigated by the need for an attacker to have commit privileges to a CVS repository exposed by an otherwise trusted ViewVC instance that also has the `show_subdir_lastmod` feature enabled. The attack vector involves files with unsafe names (names that, when embedded into an HTML stream, would cause the browser to run unwanted code), which themselves can be challenging to create. This vulnerability is patched in versions 1.2.1 and 1.1.28.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2020-04-03 00:15:00","updated_at":"2023-11-07 03:23:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://github.com/viewvc/viewvc/commit/ad0f966e9a997b17d853a6972ea283d4dcd70fa8","name":"https://github.com/viewvc/viewvc/commit/ad0f966e9a997b17d853a6972ea283d4dcd70fa8","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"issue #211: escape CVS subdir last-modified file name · viewvc/viewvc@ad0f966 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Q2STF2MKT24HXZ3YZIU7CN6F6QM67I5/","name":"FEDORA-2020-c952520959","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 30 Update: viewvc-1.1.28-1.fc30 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/viewvc/viewvc/issues/211","name":"https://github.com/viewvc/viewvc/issues/211","refsource":"MISC","tags":["Exploit","Issue Tracking","Third Party Advisory"],"title":"XSS vulnerability: CVS lastlog filename not escaped · Issue #211 · viewvc/viewvc · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Q2STF2MKT24HXZ3YZIU7CN6F6QM67I5/","name":"FEDORA-2020-c952520959","refsource":"","tags":[],"title":"[SECURITY] Fedora 30 Update: viewvc-1.1.28-1.fc30 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/viewvc/viewvc/security/advisories/GHSA-xpxf-fvqv-7mfg","name":"https://github.com/viewvc/viewvc/security/advisories/GHSA-xpxf-fvqv-7mfg","refsource":"CONFIRM","tags":["Mitigation","Patch","Third Party Advisory"],"title":"XSS vulnerability in CVS show_subdir_lastmod support · Advisory · viewvc/viewvc · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-5283","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5283","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"5283","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"viewvc","cpe5":"viewvc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5283","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"viewvc","cpe5":"viewvc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-5283","qid":"750410","title":"OpenSUSE Security Update for viewvc (openSUSE-SU-2021:0123-1)"},{"cve":"CVE-2020-5283","qid":"750421","title":"OpenSUSE Security Update for viewvc (openSUSE-SU-2021:0084-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2020-5283","STATE":"PUBLIC","TITLE":"XSS vulnerability in CVS show_subdir_lastmod support"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"viewvc","version":{"version_data":[{"version_value":"< 1.1.28"},{"version_value":">= 1.2.0, < 1.2.1"}]}}]},"vendor_name":"viewvc"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"ViewVC before versions 1.1.28 and 1.2.1 has a XSS vulnerability in CVS show_subdir_lastmod support. The impact of this vulnerability is mitigated by the need for an attacker to have commit privileges to a CVS repository exposed by an otherwise trusted ViewVC instance that also has the `show_subdir_lastmod` feature enabled. The attack vector involves files with unsafe names (names that, when embedded into an HTML stream, would cause the browser to run unwanted code), which themselves can be challenging to create. This vulnerability is patched in versions 1.2.1 and 1.1.28."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.1,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)"}]}]},"references":{"reference_data":[{"name":"https://github.com/viewvc/viewvc/security/advisories/GHSA-xpxf-fvqv-7mfg","refsource":"CONFIRM","url":"https://github.com/viewvc/viewvc/security/advisories/GHSA-xpxf-fvqv-7mfg"},{"name":"https://github.com/viewvc/viewvc/issues/211","refsource":"MISC","url":"https://github.com/viewvc/viewvc/issues/211"},{"name":"https://github.com/viewvc/viewvc/commit/ad0f966e9a997b17d853a6972ea283d4dcd70fa8","refsource":"MISC","url":"https://github.com/viewvc/viewvc/commit/ad0f966e9a997b17d853a6972ea283d4dcd70fa8"},{"refsource":"FEDORA","name":"FEDORA-2020-c952520959","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Q2STF2MKT24HXZ3YZIU7CN6F6QM67I5/"}]},"source":{"advisory":"GHSA-xpxf-fvqv-7mfg","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2020-04-03 00:15:00","lastModifiedDate":"2023-11-07 03:23:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":3.5,"baseSeverity":"LOW"},"exploitabilityScore":0.9,"impactScore":2.5},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:H/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":2.1},"severity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:viewvc:viewvc:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.28","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:viewvc:viewvc:*:*:*:*:*:*:*:*","versionStartIncluding":"1.2.0","versionEndExcluding":"1.2.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"5283","Ordinal":"165497","Title":"CVE-2020-5283","CVE":"CVE-2020-5283","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"5283","Ordinal":"1","NoteData":"ViewVC before versions 1.1.28 and 1.2.1 has a XSS vulnerability in CVS show_subdir_lastmod support. The impact of this vulnerability is mitigated by the need for an attacker to have commit privileges to a CVS repository exposed by an otherwise trusted ViewVC instance that also has the `show_subdir_lastmod` feature enabled. The attack vector involves files with unsafe names (names that, when embedded into an HTML stream, would cause the browser to run unwanted code), which themselves can be challenging to create. This vulnerability is patched in versions 1.2.1 and 1.1.28.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"5283","Ordinal":"2","NoteData":"2020-04-02","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"5283","Ordinal":"3","NoteData":"2020-05-15","Type":"Other","Title":"Modified"}]}}}