Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-25864

EPSS 83.34% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-25864

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
HashiCorp Consul and Consul Enterprise up to version 1.9.4 key-value (KV) raw mode was vulnerable to cross-site scripting. Fixed in 1.9.5, 1.8.10 and 1.7.14.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
HashiCorp Consul and Consul Enterprise 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Hashicorp HashiCorp Consul是美国HashiCorp(Hashicorp)公司的一套分布式、高可用数据中心感知解决方案。该产品用于跨动态分布式基础架构连接和配置应用程序。 HashiCorp Consul and Consul Enterprise 1.9.4版本存在安全漏洞,该漏洞源于原始模式容易受到跨站点脚本攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-25864

#POC DescriptionSource LinkShenlong Link
1HashiCorp Consul and Consul Enterprise up to version 1.9.4 are vulnerable to cross-site scripting via the key-value (KV) raw mode. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-25864.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-25864

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-04-20 · 13 CVEs total

CVE-2020-35314WonderCMS 操作系统命令注入漏洞
CVE-2020-35313WonderCMS 代码问题漏洞
CVE-2021-30464OMICRON StationGuard 资源管理错误漏洞
CVE-2020-14105Xiaomi 10 安全漏洞
CVE-2021-28156Hashicorp HashiCorp Consul 安全漏洞
CVE-2021-28492unisys stealth(core) 安全漏洞
CVE-2021-28793Lex Li vscode-restructuredtext 访问控制错误漏洞
CVE-2021-25681ADTRAN AdTran-Personal-Phone-Manager-Vulns 安全漏洞
CVE-2021-25680ADTRAN AdTran-Personal-Phone-Manager-Vulns 跨站脚本漏洞
CVE-2021-25679ADTRAN AdTran-Personal-Phone-Manager-Vulns 跨站脚本漏洞
CVE-2021-29155Linux kernel 缓冲区错误漏洞
CVE-2021-30496Telegram 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2020-25864

No comments yet


Leave a comment