Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ericsson:bscs_ix_r18_billing_\\&_rating_admx:-:*:*:*:*:*:*:*", "matchCriteriaId": "63CC94DB-B085-460F-99DF-6F70AA2400F5", "vulnerable": true}, {"criteria": "cpe:2.3:a:ericsson:bscs_ix_r18_billing_\\&_rating_mx:-:*:*:*:*:*:*:*", "matchCriteriaId": "28A2EF02-A725-4C31-B5B4-8B6D88E6497D", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "In Ericsson BSCS iX R18 Billing & Rating iX R18, ADMX is a web base module in BSCS iX that is vulnerable to stored XSS via the name or description field to a solutionUnitServlet?SuName=UserReferenceDataSU Access Rights Group. In most test cases, session hijacking was also possible by utilizing the XSS vulnerability. This potentially allows for full account takeover, or exploiting admins' browsers by using the beef framework."}, {"lang": "es", "value": "En Ericsson BSCS iX R18 Billing & Rating iX R18, ADMX es un m\u00f3dulo de base web en BSCS iX que es vulnerable a un ataque de tipo XSS almacenado por medio del campo name o description en un Access Rights Group de solutionUnitServlet?SuName=UserReferenceDataSU. En la mayor\u00eda de los casos de prueba, el secuestro de sesiones tambi\u00e9n fue posible usando una vulnerabilidad de tipo XSS. Esto potencialmente permite la toma de control total de la cuenta o la explotaci\u00f3n de los navegadores de los administradores mediante el uso del framework beef"}], "id": "CVE-2020-29145", "lastModified": "2024-11-21T05:23:44.010", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-11-27T04:15:10.307", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "http://the-it-wonders.blogspot.com/2020/01/ericsson-bscs-ix-r18-billing-rating.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "http://the-it-wonders.blogspot.com/2020/01/ericsson-bscs-ix-r18-billing-rating.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}