CVE-2020-26251

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-26251
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-26251.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-26251
Related
  • GHSA-chhr-gxrg-64x7
Published
2020-12-18T18:15:12.543Z
Modified
2025-11-14T11:01:28.421673Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Open Zaak is a modern, open-source data- and services-layer to enable zaakgericht werken, a Dutch approach to case management. In Open Zaak before version 1.3.3 the Cross-Origin-Resource-Sharing policy in Open Zaak is currently wide open - every client is allowed. This allows evil.com to run scripts that perform AJAX calls to known Open Zaak installations, and the browser will not block these. This was intended to only apply to development machines running on localhost/127.0.0.1. Open Zaak 1.3.3 disables CORS by default, while it can be opted-in through environment variables. The vulnerability does not actually seem exploitable because: a) The session cookie has a Same-Site: Lax policy which prevents it from being sent along in Cross-Origin requests. b) All pages that give access to (production) data are login-protected c) Access-Control-Allow-Credentials is set to false d) CSRF checks probably block the remote origin, since they're not explicitly added to the trusted allowlist.

References

Affected packages

Git / github.com/open-zaak/open-zaak

Affected ranges

Type
GIT
Repo
https://github.com/open-zaak/open-zaak
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.9.0

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.1.0
1.1.1
1.2.0
1.3.0
1.3.1
1.3.2

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-26251.json"