First published: Tue Aug 31 2021(Updated: )
A stored XSS vulnerability was discovered in the ECT Provider in OutSystems before 2020-09-04, affecting generated applications. It could allow an unauthenticated remote attacker to craft and store malicious Feedback content into /ECT_Provider/, such that when the content is viewed (it can only be viewed by Administrators), attacker-controlled JavaScript will execute in the security context of an administrator's browser. This is fixed in Outsystems 10.0.1005.2, Outsystems 11.9.0 Platform Server, and Outsystems 11.7.0 LifeTime Management Console.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Outsystems Lifetime Management Console | >=11<11.7.0 | |
Outsystems Outsystems | >=10<10.0.1005.2 | |
OutSystems Platform Server | >=11<11.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13639 is a stored XSS vulnerability in the ECT Provider in OutSystems before 2020-09-04.
CVE-2020-13639 affects generated applications in OutSystems.
An unauthenticated remote attacker can craft and store malicious Feedback content that can be viewed and execute unauthorized code.
OutSystems Lifetime Management Console versions 11.0 to 11.7.0, OutSystems versions 10.0 to 10.0.1005.2, and OutSystems Platform Server versions 11.0 to 11.9.0 are affected.
To fix CVE-2020-13639, it is recommended to update to OutSystems versions that include the fix or apply the security patch provided by OutSystems.