{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T18:06:06.433","vulnerabilities":[{"cve":{"id":"CVE-2020-15789","sourceIdentifier":"productcert@siemens.com","published":"2020-09-09T19:15:20.337","lastModified":"2024-11-21T05:06:11.047","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in Polarion Subversion Webclient (All versions). The web interface could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user, who must be authenticated to the web interface. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. This could allow the attacker to read or modify contents of the web application."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en Polarion Subversion Webclient (todas las versiones).&#xa0;La interfaz web podría permitir un ataque de tipo Cross-Site Request Forgery (CSRF) si se engaña a un usuario desprevenido para que acceda a un enlace malicioso.&#xa0;Una explotación con éxito requiere la interacción del usuario mediante un usuario legítimo, que debe estar autenticado en la interfaz web.&#xa0;Un ataque con éxito podría permitir a un atacante desencadenar acciones por medio de la interfaz web que el usuario legítimo puede realizar.&#xa0;Esto podría permitir al atacante leer o modificar el contenido de la aplicación web."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:N","baseScore":5.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-352"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:polarion_subversion_webclient:*:*:*:*:*:*:*:*","matchCriteriaId":"F8C6D584-AB51-40BA-9E4E-1F635297738D"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-436520.pdf","source":"productcert@siemens.com","tags":["Vendor Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-436520.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}