CVE-2020-36623

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-36623
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-36623.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-36623
Published
2022-12-21T19:15:12Z
Modified
2025-10-15T12:19:23.285698Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability was found in Pengu. It has been declared as problematic. Affected by this vulnerability is the function runApp of the file src/index.js. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The name of the patch is aea66f12b8cdfc3c8c50ad6a9c89d8307e9d0a91. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216475.

References

Affected packages

Git / github.com/jtojnar/pengu

Affected ranges

Type
GIT
Repo
https://github.com/jtojnar/pengu
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.0.2
v0.0.3
v0.0.5
v0.0.6
v0.0.7