{"vuid":"VU#660597","idnumber":"660597","name":"Periscope BuySpeed is vulnerable to stored cross-site scripting","keywords":["Periscope","xss"],"overview":"Periscope BuySpeed version 14.5 is vulnerable to stored cross-site scripting, which may allow a local, authenticated attacker to execute arbitrary JavaScript.","clean_desc":"Periscope BuySpeed is a\"tool to automate the full procure-to-pay process efficiently and intelligently\". BuySpeed version 14.5 is vulnerable to stored cross-site scripting,which could allow a local,authenticated attacker to store arbitrary JavaScript within the application. This JavaScript is subsequently displayed by the application without sanitization,leading to it executing in the browser of the user. This could potentially allow for website redirection,session hijacking,or information disclosure.","impact":"A local, authenticated attacker could add arbitrary JavaScript within the application that would execute in the browser of any user that views it, which potentially allows for website redirection, session hijacking, or information disclosure.","resolution":"This vulnerability has been corrected in BuySpeed version 15.3.","workarounds":"","sysaffected":"","thanks":"","author":"This document was written by Laurie Tyzenhaus.","public":["https://www.periscopeholdings.com/buyspeed","https://support.buyspeed.com/hc/en-us/articles/360035773831-Buyspeed-15-3-0-Release-Notes","https://cwe.mitre.org/data/definitions/79.html","https://nvd.nist.gov/vuln/detail/CVE-2020-9056","https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)#Stored_and_Reflected_XSS_Attacks","https://cheatsheetseries.owasp.org/cheatsheets/OS_Command_Injection_Defense_Cheat_Sheet.html"],"cveids":["CVE-2020-9056"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2019-06-24T17:10:17Z","publicdate":"2020-04-06T00:00:00Z","datefirstpublished":"2020-04-06T13:48:17Z","dateupdated":"2020-04-15T13:42:21Z","revision":50,"vrda_d1_directreport":"1","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"L","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"L","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"3.2","cvss_basevector":"AV:L/AC:L/Au:S/C:N/I:P/A:P","cvss_temporalscore":"2.9","cvss_environmentalscore":"0.897588926215","cvss_environmentalvector":"CDP:L/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}