{
  "threat_severity" : "Moderate",
  "public_date" : "2020-07-29T00:00:00Z",
  "bugzilla" : {
    "description" : "amq-on: CSRF (in graphQL requests)",
    "id" : "1854373",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1854373"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.9",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-352",
  "details" : [ "It was found that the AMQ Online console is vulnerable to a Cross-Site Request Forgery (CSRF) which is exploitable in cases where preflight checks are not instigated or bypassed. For example authorised users using an older browser with Adobe Flash are vulnerable when targeted by an attacker. This flaw affects all versions of AMQ-Online prior to 1.5.2 and Enmasse versions 0.31.0-rc1 up until but not including 0.32.2.", "A flaw was found in the AMQ Online console, where it is vulnerable to a Cross-Site Request Forgery attack (CSRF), which is exploitable in cases where preflight checks are not instigated or bypassed. This flaw allows an attacker to target authorized users using an older browser with Adobe Flash. The highest threat from this vulnerability is to integrity and system availability." ],
  "acknowledgement" : "This issue was discovered by Jeremy Choi (Red Hat).",
  "affected_release" : [ {
    "product_name" : "Red Hat AMQ Online 1.5.2 GA",
    "release_date" : "2020-07-29T00:00:00Z",
    "advisory" : "RHSA-2020:3209",
    "cpe" : "cpe:/a:redhat:amq_online:1.5",
    "package" : "graphQL"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-14319\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-14319" ],
  "name" : "CVE-2020-14319",
  "csaw" : false
}