CVE-2020-9862
Description
A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.
CWE
- (none)
Affected
- Apple / iOS — v=unspecified <iOS 13.6 and iPadOS 13.6 [affected]
- Apple / tvOS — v=unspecified <tvOS 13.4.8 [affected]
- Apple / watchOS — v=unspecified <watchOS 6.2.8 [affected]
- Apple / Safari — v=unspecified <Safari 13.1.2 [affected]
- Apple / iTunes for Windows — v=unspecified <iTunes 12.10.8 for Windows [affected]
- Apple / iCloud for Windows — v=unspecified <iCloud for Windows 11.3 [affected]
- Apple / iCloud for Windows (Legacy) — v=unspecified <iCloud for Windows 7.20 [affected]
CVSS
- (none)
References
- https://support.apple.com/HT211288 x_refsource_MISC
- https://support.apple.com/HT211290 x_refsource_MISC
- https://support.apple.com/HT211291 x_refsource_MISC
- https://support.apple.com/HT211292 x_refsource_MISC
- https://support.apple.com/HT211293 x_refsource_MISC
- https://support.apple.com/HT211294 x_refsource_MISC
- https://support.apple.com/HT211295 x_refsource_MISC
Source
cvelistV5-main/cves/2020/9xxx/CVE-2020-9862.json