Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-9862


A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.


Published

2020-10-16T17:15:15.433

Last Modified

2024-11-21T05:41:25.710

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-77
    CWE-116

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apple icloud < 7.20 Yes
Application apple icloud < 11.3 Yes
Application apple itunes < 12.10.8 Yes
Application apple safari < 13.1.2 Yes
Operating System apple ipados < 13.6 Yes
Operating System apple iphone_os < 13.6 Yes
Operating System apple tvos < 13.4.8 Yes
Operating System apple watchos < 6.2.8 Yes

References