CVE-2020-26260
moderate-risk
Published 2020-12-09
BookStack is a platform for storing and organising information and documentation. In BookStack before version 0.30.5, a user with permissions to edit a page could set certain image URL's to manipulate functionality in the exporting system, which would allow them to make server side requests and/or have access to a wider scope of files within the BookStack file storage locations. The issue was addressed in BookStack v0.30.5. As a workaround, page edit permissions could be limited to only those that are trusted until you can upgrade.
Do I need to act?
-
0.31% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.4/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Vendor Advisory
https://bookstackapp.com/blog/beta-release-v0-30-5/
Third Party Advisory
https://github.com/BookStackApp/BookStack/security/advisories/GHSA-8wfc-w2r5-x7c...
Vendor Advisory
https://bookstackapp.com/blog/beta-release-v0-30-5/
Third Party Advisory
https://github.com/BookStackApp/BookStack/security/advisories/GHSA-8wfc-w2r5-x7c...
30
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal