Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qf8w-r56m-c9xh

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, which may allow alteration or creation of license files for when combined with CVE-2020-14515.

This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, which may allow alteration or creation of license files for when combined with CVE-2020-14515.

EPSS

Процентиль: 25%
0.00086
Низкий

Связанные уязвимости

CVSS3: 7.5
nvd
больше 5 лет назад

This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, which may allow alteration or creation of license files for when combined with CVE-2020-14515.

CVSS3: 8.1
fstec
больше 5 лет назад

Уязвимость компонента WebSockets API приложения контроля лицензий CodeMeter, позволяющая нарушителю получить несанкционированный доступ на изменение или создание файлов лицензий для CmActLicense

EPSS

Процентиль: 25%
0.00086
Низкий