CVE-2020-13576Integer Overflow to Buffer Overflow in Gsoap

Severity
9.8CRITICALNVD
EPSS
0.8%
top 26.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 10
Latest updateMay 24

Description

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

Debiangenivia/gsoap< 2.8.104-3+3
NVDgenivia/gsoap2.8.107

Also affects: Fedora 33, 34

🔴Vulnerability Details

3
GHSA
GHSA-wx33-jrf7-q6rw: A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 22022-05-24
CVEList
CVE-2020-13576: A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 22021-02-10
OSV
CVE-2020-13576: A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 22021-02-10

📋Vendor Advisories

1
Debian
CVE-2020-13576: gsoap - A code execution vulnerability exists in the WS-Addressing plugin functionality ...2020
CVE-2020-13576 — Integer Overflow to Buffer Overflow | cvebase