From 02d5accefaf3a4a893ff0f2be5799b869d2f0651 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 4 Apr 2023 15:45:42 -0400 Subject: [PATCH] Enhancement: cves/2020/CVE-2020-5775.yaml by md --- cves/2020/CVE-2020-5775.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/cves/2020/CVE-2020-5775.yaml b/cves/2020/CVE-2020-5775.yaml index 66b3cb1d14..8735a89eb5 100644 --- a/cves/2020/CVE-2020-5775.yaml +++ b/cves/2020/CVE-2020-5775.yaml @@ -1,13 +1,13 @@ id: CVE-2020-5775 info: - name: Canvas LMS Unauthenticated Blind SSRF + name: Canvas 2020-07-29 - Blind Server-Side Request Forgery author: alph4byt3 severity: medium - description: Server-Side Request Forgery in Canvas LMS 2020-07-29 allows a remote, unauthenticated attacker to cause the Canvas application to perform HTTP GET requests to arbitrary domains. + description: Canvas 2020-07-29 is susceptible to blind server-side request forgery. An attacker can cause Canvas to perform HTTP GET requests to arbitrary domains and thus potentially access sensitive information, modify data, and/or execute unauthorized operations. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2020-5775 - https://www.tenable.com/security/research/tra-2020-49 + - https://nvd.nist.gov/vuln/detail/CVE-2020-5775 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N cvss-score: 5.8 @@ -25,3 +25,5 @@ requests: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" + +# Enhanced by md on 2023/04/04