A vulnerability was found in Refined Toolkit. It has been rated as problematic. Affected by this issue is some unknown functionality of the component UI-Image/UI-Button. The manipulation leads to cross site scripting. Using CWE to declare the problem leads to CWE-79. The weakness was published 11/08/2020. The advisory is available at seclists.org. This vulnerability is handled as CVE-2020-36524. The attack may be launched remotely. There are no technical details available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment. This vulnerability is assigned to T1059.007 by the MITRE ATT&CK project. It is declared as proof-of-concept. The exploit is available at seclists.org. As 0-day the estimated underground price was around $0-$5k. A possible mitigation has been published even before and not after the disclosure of the vulnerability.
Field | 11/08/2020 15:48 | 05/27/2022 07:22 |
---|---|---|
name | Refined Toolkit | Refined Toolkit |
component | UI-Image/UI-Button | UI-Image/UI-Button |
cwe | 79 (cross site scripting) | 79 (cross site scripting) |
risk | 1 | 1 |
cvss3 | N | N |
cvss3 | L | L |
cvss3 | R | R |
cvss3 | U | U |
cvss3 | N | N |
cvss3 | L | L |
cvss3 | N | N |
url | https://seclists.org/fulldisclosure/2020/Oct/15 | https://seclists.org/fulldisclosure/2020/Oct/15 |
availability | 1 | 1 |
publicity | 1 | 1 |
url | https://seclists.org/fulldisclosure/2020/Oct/15 | https://seclists.org/fulldisclosure/2020/Oct/15 |
date | 1604790000 (11/08/2020) | 1604790000 (11/08/2020) |
cvss2 | N | N |
cvss2 | L | L |
cvss2 | N | N |
cvss2 | P | P |
cvss2 | N | N |
cvss2 | S | S |
cvss2 | ND | ND |
cvss2 | ND | ND |
cvss2 | ND | ND |
cvss3 | L | L |
cvss3 | X | X |
cvss3 | X | X |
cvss3 | X | X |
cvss2 | 4.0 | 4.0 |
cvss2 | 4.0 | 4.0 |
cvss3 | 3.5 | 3.5 |
cvss3 | 3.3 | 3.5 |
cvss3 | 3.5 | 3.5 |
cvss3 | 3.3 | 3.5 |
price | $0-$5k | $0-$5k |
cve | CVE-2020-36524 | |
responsible | VulDB |