CVE-2020-26118

In SmartBear Collaborator Server through 13.3.13302, use of the Google Web Toolkit (GWT) API introduces a post-authentication Java deserialization vulnerability. The application's UpdateMemento class accepts a serialized Java object directly from the user without properly sanitizing it. A malicious object can be submitted to the server via an authenticated attacker to execute commands on the underlying system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:smartbear:collaborator:*:*:*:*:*:*:*:*

History

14 Jan 2021, 21:39

Type Values Removed Values Added
CPE cpe:2.3:a:smartbear:collaborator:*:*:*:*:*:*:*:*
CWE CWE-78
CVSS v2 : unknown
v3 : unknown
v2 : 9.0
v3 : 8.8
References (MISC) https://support.smartbear.com/collaborator/docs/server/index.html - (MISC) https://support.smartbear.com/collaborator/docs/server/index.html - Product, Vendor Advisory
References (MISC) https://support.smartbear.com/collaborator/docs/general-info/whats-new.html - (MISC) https://support.smartbear.com/collaborator/docs/general-info/whats-new.html - Release Notes, Vendor Advisory
References (CONFIRM) https://support.smartbear.com/collaborator/docs/general-info/version-history/ver-13/ver-13-0.html - (CONFIRM) https://support.smartbear.com/collaborator/docs/general-info/version-history/ver-13/ver-13-0.html - Release Notes, Vendor Advisory

11 Jan 2021, 19:15

Type Values Removed Values Added
References
  • (MISC) https://support.smartbear.com/collaborator/docs/general-info/whats-new.html -
Summary In SmartBear Collaborator Server through 13.1.13100, use of the Google Web Toolkit (GWT) API introduces a post-authentication Java deserialization vulnerability. The application accepts a serialized Java object directly from the user without properly sanitizing it. A malicious object can be submitted to the server via an authenticated attacker to execute commands on the underlying system. In SmartBear Collaborator Server through 13.3.13302, use of the Google Web Toolkit (GWT) API introduces a post-authentication Java deserialization vulnerability. The application's UpdateMemento class accepts a serialized Java object directly from the user without properly sanitizing it. A malicious object can be submitted to the server via an authenticated attacker to execute commands on the underlying system.

11 Jan 2021, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2021-01-11 15:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-26118

Mitre link : CVE-2020-26118

CVE.ORG link : CVE-2020-26118


JSON object : View

Products Affected

smartbear

  • collaborator
CWE
CWE-502

Deserialization of Untrusted Data