Open bbreilin opened 4 years ago
@bbreilin a couple of things here while triaging. I couldn't find any details about CB 3.3 and AFAIK, only the following exists:
Could you maybe be a bit more specific on your version descriptions above (official source)
I'll assume you refer to CB3.1 but let me know otherwise.
Receives the following vector with CVSS 3.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
and a severity scoring of 8.8
.
Asigned preliminarily CVE-2020-10264.
Our team is working on an alurity.yml file to validate this scenario. Also, a robosploit module will be created.
Removed triage label, CVE asignation on its way https://github.com/CVEProject/cvelist/pull/3514. Thanks again @bbreilin and @bedieber for the ticket.
Your CVE ID will be CVE-2020-10264
Video that shows the process:
Minor edition in this ticket to avoid https://pyyaml.org/wiki/YAMLColonInFlowContext.
Essentially, replaced scalar link by a string link.