{"api_version":"1","generated_at":"2026-04-23T04:20:54+00:00","cve":"CVE-2020-9952","urls":{"html":"https://cve.report/CVE-2020-9952","api":"https://cve.report/api/cve/CVE-2020-9952.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-9952","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-9952"},"summary":{"title":"CVE-2020-9952","description":"An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2020-10-16 17:15:00","updated_at":"2023-01-09 16:41:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://support.apple.com/HT211847","name":"https://support.apple.com/HT211847","refsource":"MISC","tags":["Release Notes","Vendor Advisory"],"title":"About the security content of iCloud for Windows 7.21 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT211850","name":"https://support.apple.com/HT211850","refsource":"MISC","tags":["Vendor Advisory"],"title":"About the security content of iOS 14.0 and iPadOS 14.0 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT211844","name":"https://support.apple.com/HT211844","refsource":"MISC","tags":["Release Notes","Vendor Advisory"],"title":"About the security content of watchOS 7.0 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2020/Nov/22","name":"20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0","refsource":"FULLDISC","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2020/11/23/3","name":"[oss-security] 20201123 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0008","refsource":"MLIST","tags":["Mailing List"],"title":"oss-security - WebKitGTK and WPE WebKit Security Advisory WSA-2020-0008","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT211843","name":"https://support.apple.com/HT211843","refsource":"MISC","tags":["Release Notes","Vendor Advisory"],"title":"About the security content of tvOS 14.0 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2020/Nov/18","name":"20201115 APPLE-SA-2020-11-13-5 Additional information for APPLE-SA-2020-09-16-3 Safari 14.0","refsource":"FULLDISC","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: APPLE-SA-2020-11-13-5 Additional information for APPLE-SA-2020-09-16-3 Safari 14.0","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202012-10","name":"GLSA-202012-10","refsource":"GENTOO","tags":[],"title":"WebkitGTK+: Multiple vulnerabilities (GLSA 202012-10) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2020/Nov/19","name":"20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0","refsource":"FULLDISC","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT211845","name":"https://support.apple.com/HT211845","refsource":"MISC","tags":["Release Notes","Vendor Advisory"],"title":"About the security content of Safari 14.0 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2020/Nov/20","name":"20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0","refsource":"FULLDISC","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT211846","name":"https://support.apple.com/HT211846","refsource":"MISC","tags":["Release Notes","Vendor Advisory"],"title":"About the security content of iCloud for Windows 11.4 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-9952","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9952","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"9952","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"icloud","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"windows","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"9952","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"icloud","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"windows","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"9952","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipados","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"9952","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipad_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"9952","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipad_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"9952","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"9952","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"9952","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"safari","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"9952","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"safari","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"9952","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"tvos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"9952","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"tvos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"9952","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"watchos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"9952","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"watchos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"9952","vulnerable":"1","versionEndIncluding":"2.30.3","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"webkit","cpe5":"webkitgtk\\+","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-9952","qid":"501707","title":"Alpine Linux Security Update for webkit2gtk"},{"cve":"CVE-2020-9952","qid":"505513","title":"Alpine Linux Security Update for webkit2gtk"},{"cve":"CVE-2020-9952","qid":"751623","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2022:0142-1)"},{"cve":"CVE-2020-9952","qid":"751646","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2022:0183-1)"},{"cve":"CVE-2020-9952","qid":"751648","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2022:0182-1)"},{"cve":"CVE-2020-9952","qid":"751659","title":"OpenSUSE Security Update for webkit2gtk3 (openSUSE-SU-2022:0182-1)"},{"cve":"CVE-2020-9952","qid":"751755","title":"OpenSUSE Security Update for webkit2gtk3 (openSUSE-SU-2022:0182-2)"},{"cve":"CVE-2020-9952","qid":"960761","title":"Rocky Linux Security Update for GNOME (RLSA-2020:4451)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-9952","ASSIGNER":"product-security@apple.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apple","product":{"product_data":[{"product_name":"iOS","version":{"version_data":[{"version_affected":"<","version_value":"iOS 14.0 and iPadOS 14.0"}]}},{"product_name":"tvOS","version":{"version_data":[{"version_affected":"<","version_value":"tvOS 14.0"}]}},{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_value":"watchOS 7.0"}]}},{"product_name":"Safari","version":{"version_data":[{"version_affected":"<","version_value":"Safari 14.0"}]}},{"product_name":"iCloud for Windows","version":{"version_data":[{"version_affected":"<","version_value":"iCloud for Windows 11.4"}]}},{"product_name":"iCloud for Windows (Legacy)","version":{"version_data":[{"version_affected":"<","version_value":"iCloud for Windows 7.21"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Processing maliciously crafted web content may lead to a cross site scripting attack"}]}]},"references":{"reference_data":[{"url":"https://support.apple.com/HT211850","refsource":"MISC","name":"https://support.apple.com/HT211850"},{"url":"https://support.apple.com/HT211844","refsource":"MISC","name":"https://support.apple.com/HT211844"},{"url":"https://support.apple.com/HT211845","refsource":"MISC","name":"https://support.apple.com/HT211845"},{"url":"https://support.apple.com/HT211843","refsource":"MISC","name":"https://support.apple.com/HT211843"},{"url":"https://support.apple.com/HT211846","refsource":"MISC","name":"https://support.apple.com/HT211846"},{"url":"https://support.apple.com/HT211847","refsource":"MISC","name":"https://support.apple.com/HT211847"},{"refsource":"FULLDISC","name":"20201115 APPLE-SA-2020-11-13-5 Additional information for APPLE-SA-2020-09-16-3 Safari 14.0","url":"http://seclists.org/fulldisclosure/2020/Nov/18"},{"refsource":"FULLDISC","name":"20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0","url":"http://seclists.org/fulldisclosure/2020/Nov/19"},{"refsource":"FULLDISC","name":"20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0","url":"http://seclists.org/fulldisclosure/2020/Nov/20"},{"refsource":"FULLDISC","name":"20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0","url":"http://seclists.org/fulldisclosure/2020/Nov/22"},{"refsource":"MLIST","name":"[oss-security] 20201123 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0008","url":"http://www.openwall.com/lists/oss-security/2020/11/23/3"},{"refsource":"GENTOO","name":"GLSA-202012-10","url":"https://security.gentoo.org/glsa/202012-10"}]},"description":{"description_data":[{"lang":"eng","value":"An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack."}]}},"nvd":{"publishedDate":"2020-10-16 17:15:00","lastModifiedDate":"2023-01-09 16:41:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW","baseScore":7.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":5.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"14.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*","versionEndExcluding":"14.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*","versionEndExcluding":"7.21","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*","versionStartIncluding":"11.0","versionEndExcluding":"11.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","versionEndExcluding":"14.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"14.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:webkit:webkitgtk\\+:*:*:*:*:*:*:*:*","versionEndIncluding":"2.30.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"9952","Ordinal":"170348","Title":"CVE-2020-9952","CVE":"CVE-2020-9952","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"9952","Ordinal":"1","NoteData":"An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"9952","Ordinal":"2","NoteData":"2020-10-16","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"9952","Ordinal":"3","NoteData":"2020-12-23","Type":"Other","Title":"Modified"}]}}}