Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-10146— Microsoft Teams displayName stored cross-site scripting vulnerability

CVSS 5.7 · Medium EPSS 0.52% · P67
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-10146

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Microsoft Teams displayName stored cross-site scripting vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Microsoft Teams online service contains a stored cross-site scripting vulnerability in the displayName parameter that can be exploited on Teams clients to obtain sensitive information such as authentication tokens and to possibly execute arbitrary commands. This vulnerability was fixed for all Teams users in the online service on or around October 2020.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Teams 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Teams是美国微软(Microsoft)公司的一款用于在线会议、聊天、云存储功能的软件。 Microsoft Teams online service 存在跨站脚本漏洞,该漏洞源于displayName参数中包含一个存储的跨站点脚本漏洞,可以在团队客户端上利用该漏洞来获取敏感信息,如认证令牌,并可能执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftTeams unspecified ~ on or about October 2020 -

II. Public POCs for CVE-2020-10146

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-10146

Please Login to view more intelligence information

Same Patch Batch · Microsoft · 2020-12-09 · 58 CVEs total

CVE-2020-171329.1 CRITICALMicrosoft Exchange Remote Code Execution Vulnerability
CVE-2020-171429.1 CRITICALMicrosoft Exchange Remote Code Execution Vulnerability
CVE-2020-171588.8 HIGHMicrosoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vuln
CVE-2020-171528.8 HIGHMicrosoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vuln
CVE-2020-171218.8 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2020-171438.8 HIGHMicrosoft Exchange Server Information Disclosure Vulnerability
CVE-2020-171478.7 HIGHDynamics CRM Webclient Cross-site Scripting Vulnerability
CVE-2020-170958.5 HIGHWindows Hyper-V Remote Code Execution Vulnerability
CVE-2020-171448.4 HIGHMicrosoft Exchange Remote Code Execution Vulnerability
CVE-2020-171418.4 HIGHMicrosoft Exchange Remote Code Execution Vulnerability
CVE-2020-171408.1 HIGHWindows SMB Information Disclosure Vulnerability
CVE-2020-171188.1 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2020-171158.0 HIGHMicrosoft SharePoint Server Spoofing Vulnerability
CVE-2020-171567.8 HIGHVisual Studio Remote Code Execution Vulnerability
CVE-2020-171247.8 HIGHMicrosoft PowerPoint Remote Code Execution Vulnerability
CVE-2020-171297.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-171287.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-171277.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-169587.8 HIGHWindows Backup Engine Elevation of Privilege Vulnerability
CVE-2020-171257.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability

Showing top 20 of 58 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-10146

No comments yet


Leave a comment