Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:wems:enterprise_manager:2.19.7959:*:*:*:*:*:*:*", "matchCriteriaId": "5822030A-6F39-45F3-9B46-F7F3D278EB04", "vulnerable": true}, {"criteria": "cpe:2.3:a:wems:enterprise_manager:2.55.8782:*:*:*:*:*:*:*", "matchCriteriaId": "0BB63236-E267-45E0-9E48-D15EBD7DF03C", "vulnerable": true}, {"criteria": "cpe:2.3:a:wems:enterprise_manager:2.55.8806:*:*:*:*:*:*:*", "matchCriteriaId": "1B121B5E-B063-4B61-85E8-B79C01CFA575", "vulnerable": true}, {"criteria": "cpe:2.3:a:wems:enterprise_manager:2.58.8903:*:*:*:*:*:*:*", "matchCriteriaId": "CB15256B-6CB4-44A0-AF2B-8ACCE16C5ECE", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "In WEMS Limited Enterprise Manager 2.58, input passed to the GET parameter 'email' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site."}, {"lang": "es", "value": "En WEMS Limited Enterprise Manager versi\u00f3n 2.58, la entrada pasada al par\u00e1metro GET \"email\" no se sanea apropiadamente antes de ser devuelta al usuario. Esto puede ser explotado para ejecutar c\u00f3digo HTML arbitrario en la sesi\u00f3n del navegador de un usuario en el contexto de un sitio afectado"}], "id": "CVE-2020-21993", "lastModified": "2024-11-21T05:12:59.067", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-04-28T15:15:07.883", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://cxsecurity.com/issue/WLB-2020010032"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5551.php"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://cxsecurity.com/issue/WLB-2020010032"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5551.php"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}