CVE-2020-10560
moderate-risk
Published 2020-03-30
An issue was discovered in Open Source Social Network (OSSN) through 5.3. A user-controlled file path with a weak cryptographic rand() can be used to read any file with the permissions of the webserver. This can lead to further compromise. The attacker must conduct a brute-force attack against the SiteKey to insert into a crafted URL for components/OssnComments/ossn_com.php and/or libraries/ossn.lib.upgrade.php.
Do I need to act?
~
6.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10
Medium
NETWORK
/ HIGH complexity
Affected Products (1)
Open Source Social Network
Affected Vendors
References (4)
Third Party Advisory
https://github.com/LucidUnicorn/CVE-2020-10560-Key-Recovery
Third Party Advisory
https://github.com/LucidUnicorn/CVE-2020-10560-Key-Recovery
32
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
9/34 · Low
Exposure
5/34 · Minimal