Show plain JSON{"containers": {"cna": {"affected": [{"product": "mymbCONNECT24", "vendor": "MB connect line", "versions": [{"lessThanOrEqual": "2.6.2", "status": "affected", "version": "2.6.2", "versionType": "custom"}]}, {"product": "mbCONNECT24", "vendor": "MB connect line", "versions": [{"lessThanOrEqual": "2.6.2", "status": "affected", "version": "2.6.2", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "OTORIO reported the vulnerabilities to MB connect line. CERT@VDE coordinated."}], "datePublic": "2021-02-15T00:00:00", "descriptions": [{"lang": "en", "value": "An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. There is an XSS issue in the redirect.php allowing an attacker to inject code via a get parameter."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2021-03-02T21:15:25", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://cert.vde.com/de-de/advisories/vde-2021-003"}], "solutions": [{"lang": "en", "value": "Update to v2.7.1"}], "source": {"advisory": "VDE-2021-003", "discovery": "EXTERNAL"}, "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-02-15T13:50:00.000Z", "ID": "CVE-2020-12530", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "mymbCONNECT24", "version": {"version_data": [{"version_affected": "<=", "version_name": "2.6.2", "version_value": "2.6.2"}]}}, {"product_name": "mbCONNECT24", "version": {"version_data": [{"version_affected": "<=", "version_name": "2.6.2", "version_value": "2.6.2"}]}}]}, "vendor_name": "MB connect line"}]}}, "credit": [{"lang": "eng", "value": "OTORIO reported the vulnerabilities to MB connect line. CERT@VDE coordinated."}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. There is an XSS issue in the redirect.php allowing an attacker to inject code via a get parameter."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)"}]}]}, "references": {"reference_data": [{"name": "https://cert.vde.com/de-de/advisories/vde-2021-003", "refsource": "CONFIRM", "url": "https://cert.vde.com/de-de/advisories/vde-2021-003"}]}, "solution": [{"lang": "en", "value": "Update to v2.7.1"}], "source": {"advisory": "VDE-2021-003", "discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T11:56:52.104Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://cert.vde.com/de-de/advisories/vde-2021-003"}]}]}, "cveMetadata": {"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2020-12530", "datePublished": "2021-03-02T21:15:25.258645Z", "dateReserved": "2020-04-30T00:00:00", "dateUpdated": "2024-09-16T19:55:41.845Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}