Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-5775

EPSS 65.83% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-5775

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Server-Side Request Forgery in Canvas LMS 2020-07-29 allows a remote, unauthenticated attacker to cause the Canvas application to perform HTTP GET requests to arbitrary domains.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Canvas LMS 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Canvas LMS 2020-07-29 存在安全漏洞,未经身份验证的攻击者导致Canvas应用程序对任意域执行HTTP GET请求。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-Instructure Canvas Learning Management System (LMS) Canvas LMS 2020-07-29 -

II. Public POCs for CVE-2020-5775

#POC DescriptionSource LinkShenlong Link
1Canvas version 2020-07-29 is susceptible to blind server-side request forgery. An attacker can cause Canvas to perform HTTP GET requests to arbitrary domains and thus potentially access sensitive information, modify data, and/or execute unauthorized operations.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-5775.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-5775

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-08-21 · 48 CVEs total

CVE-2020-245899.1 CRITICALWSO2 API Manager 安全漏洞
CVE-2020-245909.1 CRITICALWSO2 API Manager 安全漏洞
CVE-2019-118579.1 CRITICALALEOS AceManager Information Disclosure
CVE-2019-118628.1 HIGHALEOS SSH Service Allows Traffic Proxying
CVE-2020-77108.1 HIGHSandbox Escape
CVE-2019-118558.1 HIGHALEOS LAN-Side RPC Server
CVE-2019-118477.3 HIGHALEOS User Root Shell Escalation
CVE-2020-245916.5 MEDIUMWSO2 多款产品代码问题漏洞
CVE-2019-118496.3 MEDIUMALEOS AT API Stack Overflow
CVE-2019-118506.3 MEDIUMALEOS AT Command Stack Overflow
CVE-2020-158586.2 MEDIUMThales DIS 路径遍历漏洞
CVE-2019-118596.0 MEDIUMALEOS SMS Handler Buffer Overflow
CVE-2019-118585.7 MEDIUMALEOS Multiple Web UI vulnerabilities
CVE-2019-118484.1 MEDIUMALEOS AT Command API Abuse
CVE-2019-118533.9 LOWALEOS AT Command Injections
CVE-2019-118523.7 LOWALEOS ACEView Service Out-Of-Bounds Read
CVE-2019-118563.3 LOWALEOS ACEView Message Replay
CVE-2020-20633WordPress 跨站脚本漏洞
CVE-2020-3975VMware App Volumes 跨站脚本漏洞
CVE-2020-20634Elementor WordPress 安全漏洞

Showing top 20 of 48 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-5775

No comments yet


Leave a comment