Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-25019

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-29 Aug, 2020 | 16:07
Updated At-04 Aug, 2024 | 15:26
Rejected At-
Credits

jitsi-meet-electron (aka Jitsi Meet Electron) before 2.3.0 calls the Electron shell.openExternal function without verifying that the URL is for an http or https resource, in some circumstances.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:29 Aug, 2020 | 16:07
Updated At:04 Aug, 2024 | 15:26
Rejected At:
▼CVE Numbering Authority (CNA)

jitsi-meet-electron (aka Jitsi Meet Electron) before 2.3.0 calls the Electron shell.openExternal function without verifying that the URL is for an http or https resource, in some circumstances.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/jitsi/jitsi-meet-electron/commit/ca1eb702507fdc4400fe21c905a9f85702f92a14
x_refsource_MISC
https://github.com/jitsi/jitsi-meet-electron/releases/tag/v2.3.0
x_refsource_MISC
https://security.stackexchange.com/questions/225799
x_refsource_MISC
Hyperlink: https://github.com/jitsi/jitsi-meet-electron/commit/ca1eb702507fdc4400fe21c905a9f85702f92a14
Resource:
x_refsource_MISC
Hyperlink: https://github.com/jitsi/jitsi-meet-electron/releases/tag/v2.3.0
Resource:
x_refsource_MISC
Hyperlink: https://security.stackexchange.com/questions/225799
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/jitsi/jitsi-meet-electron/commit/ca1eb702507fdc4400fe21c905a9f85702f92a14
x_refsource_MISC
x_transferred
https://github.com/jitsi/jitsi-meet-electron/releases/tag/v2.3.0
x_refsource_MISC
x_transferred
https://security.stackexchange.com/questions/225799
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/jitsi/jitsi-meet-electron/commit/ca1eb702507fdc4400fe21c905a9f85702f92a14
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/jitsi/jitsi-meet-electron/releases/tag/v2.3.0
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://security.stackexchange.com/questions/225799
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:29 Aug, 2020 | 17:15
Updated At:03 Sep, 2020 | 17:58

jitsi-meet-electron (aka Jitsi Meet Electron) before 2.3.0 calls the Electron shell.openExternal function without verifying that the URL is for an http or https resource, in some circumstances.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

jitsi
jitsi
>>meet_electron>>Versions before 2.3.0(exclusive)
cpe:2.3:a:jitsi:meet_electron:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-345Primarynvd@nist.gov
CWE ID: CWE-345
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/jitsi/jitsi-meet-electron/commit/ca1eb702507fdc4400fe21c905a9f85702f92a14cve@mitre.org
Patch
Third Party Advisory
https://github.com/jitsi/jitsi-meet-electron/releases/tag/v2.3.0cve@mitre.org
Release Notes
Third Party Advisory
https://security.stackexchange.com/questions/225799cve@mitre.org
Exploit
Third Party Advisory
Hyperlink: https://github.com/jitsi/jitsi-meet-electron/commit/ca1eb702507fdc4400fe21c905a9f85702f92a14
Source: cve@mitre.org
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/jitsi/jitsi-meet-electron/releases/tag/v2.3.0
Source: cve@mitre.org
Resource:
Release Notes
Third Party Advisory
Hyperlink: https://security.stackexchange.com/questions/225799
Source: cve@mitre.org
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

58Records found

CVE-2023-38552
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.20%
||
7 Day CHG~0.00%
Published-18 Oct, 2023 | 03:55
Updated-30 Apr, 2025 | 22:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

Action-Not Available
Vendor-Node.js (OpenJS Foundation)Fedora Project
Product-fedoranode.jsNode
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2024-47867
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-2.1||LOW
EPSS-0.14% / 34.72%
||
7 Day CHG~0.00%
Published-10 Oct, 2024 | 22:19
Updated-15 Nov, 2024 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lack of integrity check on the downloaded FRP client in Gradio

Gradio is an open-source Python package designed for quick prototyping. This vulnerability is a **lack of integrity check** on the downloaded FRP client, which could potentially allow attackers to introduce malicious code. If an attacker gains access to the remote URL from which the FRP client is downloaded, they could modify the binary without detection, as the Gradio server does not verify the file's checksum or signature. Any users utilizing the Gradio server's sharing mechanism that downloads the FRP client could be affected by this vulnerability, especially those relying on the executable binary for secure data tunneling. There is no direct workaround for this issue without upgrading. However, users can manually validate the integrity of the downloaded FRP client by implementing checksum or signature verification in their own environment to ensure the binary hasn't been tampered with.

Action-Not Available
Vendor-gradio_projectgradio-app
Product-gradiogradio
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2024-45410
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-4.63% / 88.85%
||
7 Day CHG~0.00%
Published-19 Sep, 2024 | 22:51
Updated-25 Sep, 2024 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HTTP client can remove the X-Forwarded headers in Traefik

Traefik is a golang, Cloud Native Application Proxy. When a HTTP request is processed by Traefik, certain HTTP headers such as X-Forwarded-Host or X-Forwarded-Port are added by Traefik before the request is routed to the application. For a HTTP client, it should not be possible to remove or modify these headers. Since the application trusts the value of these headers, security implications might arise, if they can be modified. For HTTP/1.1, however, it was found that some of theses custom headers can indeed be removed and in certain cases manipulated. The attack relies on the HTTP/1.1 behavior, that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been addressed in release versions 2.11.9 and 3.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-traefiktraefiktraefik
Product-traefiktraefiktraefik
CWE ID-CWE-348
Use of Less Trusted Source
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2021-23998
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.22% / 44.65%
||
7 Day CHG-0.02%
Published-24 Jun, 2021 | 13:25
Updated-03 Aug, 2024 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Through complicated navigations with new windows, an HTTP page could have inherited a secure lock icon from an HTTPS page. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.

Action-Not Available
Vendor-Mozilla Corporation
Product-firefoxthunderbirdfirefox_esrThunderbirdFirefox ESRFirefox
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2021-21320
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-2.6||LOW
EPSS-0.18% / 40.43%
||
7 Day CHG~0.00%
Published-02 Mar, 2021 | 02:45
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
User content sandbox can be confused into opening arbitrary documents

matrix-react-sdk is an npm package which is a Matrix SDK for React Javascript. In matrix-react-sdk before version 3.15.0, the user content sandbox can be abused to trick users into opening unexpected documents. The content is opened with a `blob` origin that cannot access Matrix user data, so messages and secrets are not at risk. This has been fixed in version 3.15.0.

Action-Not Available
Vendor-The Matrix.org Foundation
Product-matrix-react-sdkmatrix-react-sdk
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2021-21588
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 34.42%
||
7 Day CHG~0.00%
Published-12 Jul, 2021 | 15:40
Updated-17 Sep, 2024 | 00:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC PowerFlex, v3.5.x contain a Cross-Site WebSocket Hijacking Vulnerability in the Presentation Server/WebUI. An unauthenticated attacker could potentially exploit this vulnerability by tricking the user into performing unwanted actions on the Presentation Server and perform which may lead to configuration changes.

Action-Not Available
Vendor-Dell Inc.
Product-powerflex_presentation_serverPowerFlex
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2024-33687
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.77%
||
7 Day CHG~0.00%
Published-24 Jun, 2024 | 15:03
Updated-13 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient verification of data authenticity issue exists in NJ Series CPU Unit all versions and NX Series CPU Unit all versions. If a user program in the affected product is altered, the product may not be able to detect the alteration.

Action-Not Available
Vendor-omronOMRON Corporation
Product-nx1p2-1040dt1_firmwarenx1p2-9024dt1_firmwarenx102-1100_firmwarenj501-4300_firmwarenj101-1020nx701-1600_firmwarenx102-1020_firmwarenj501-4300nj501-5300-1nj-pd3001nx1w-mab221nj501-1320_firmwarenx1p2-1040dt_firmwarenj501-5300_firmwarenj501-1340nx701-z700_firmwarenj501-4310_firmwarenx1w-mab221_firmwarenx701-1600nj501-r420nj101-9000nx102-9000_firmwarenj101-1000nx102-1120nj501-4500nx1p2-9024dtnx102-1020nj-pa3001nj501-4400_firmwarenj501-1300_firmwarenx1p2-1040dt1nj501-4400nj101-1020_firmwarenx701-z700nx701-1700_firmwarenj501-1320nx1p2-9024dt_firmwarenj501-5300-1_firmwarenj501-4310nj101-9000_firmwarenx1p2-1040dtnj501-1400nx102-1100nj101-9020nx1w-adb21nj501-r520nj501-r400_firmwarenj-pa3001_firmwarenj501-r400nj501-1340_firmwarenj101-1000_firmwarenx1p2-1140dt1nj501-r320nj-pd3001_firmwarenj501-4500_firmwarenx1p2-9024dt1nx701-1720_firmwarenx102-1220_firmwarenx102-1200nj501-r320_firmwarenx1w-cif01nx102-1000_firmwarenx102-9020_firmwarenj501-5300nj501-1500nx1w-dab21v_firmwarenx1w-adb21_firmwarenx701-1700nj501-140nx102-1220nj301-1100_firmwarenx701-1720nj501-r300_firmwarenx102-1000nj501-1520_firmwarenx1w-cif11_firmwarenj301-1200nx1w-cif01_firmwarenj501-r520_firmwarenj101-9020_firmwarenj501-r300nj301-1100nj501-4320nx102-9020nx102-1120_firmwarenj501-r500_firmwarenx1w-cif12nx1p2-1140dt_firmwarenx1p2-1140dt1_firmwarenx1w-cif11nx1w-cif12_firmwarenj501-1300nj501-r500nx701-1620nx701-z600_firmwarenj501-1520nx701-z600nx102-9000nj501-4320_firmwarenx701-1620_firmwarenj501-1500_firmwarenx1w-dab21vnj301-1200_firmwarenx102-1200_firmwarenj501-r420_firmwarenj501-1400_firmwarenj501-1420nx1p2-1140dtnj501-140_firmwarenj501-1420_firmwareNX Series CPU UnitNJ Series CPU Unit
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2020-9885
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.11% / 30.02%
||
7 Day CHG~0.00%
Published-16 Oct, 2020 | 16:36
Updated-04 Aug, 2024 | 10:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue existed in the handling of iMessage tapbacks. The issue was resolved with additional verification. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A user that is removed from an iMessage group could rejoin the group.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_oswatchostvosipadosmac_os_xtvOSmacOSwatchOSiOS
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
  • Previous
  • 1
  • 2
  • Next
Details not found