Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-13576

Опубликовано: 10 фев. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

2.8.117-2build1
esm-apps/bionic

needed

esm-apps/focal

needed

esm-apps/jammy

needed

esm-apps/noble

not-affected

2.8.117-2build1
esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needed
groovy

ignored

end of life

Показывать по

EPSS

Процентиль: 73%
0.0076
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 5 лет назад

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

CVSS3: 9.8
debian
почти 5 лет назад

A code execution vulnerability exists in the WS-Addressing plugin func ...

suse-cvrf
почти 5 лет назад

Security update for gsoap

CVSS3: 9.8
github
больше 3 лет назад

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

CVSS3: 9.8
fstec
больше 5 лет назад

Уязвимость плагина WS-Addressing среды разработки программного обеспечения gSOAP, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 73%
0.0076
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3