CVE-2020-13576

EUVD-2020-5823
A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
talosCNA
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 72%
Affected Products (NVD)
VendorProductVersion
geniviagsoap
2.8.107
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gsoap
bookworm
2.8.124-2
fixed
bullseye
2.8.104-3
fixed
sid
2.8.135-2
fixed
stretch
ignored
trixie
2.8.132-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gsoap
bionic
needed
focal
needed
groovy
ignored
hirsute
ignored
impish
ignored
jammy
needed
kinetic
ignored
lunar
not-affected
mantic
not-affected
noble
not-affected
trusty
dne
xenial
needs-triage