{"id":"CVE-2020-10715","details":"A content spoofing vulnerability was found in the openshift/console 3.11 and 4.x. This flaw allows an attacker to craft a URL and inject arbitrary text onto the error page that appears to be from the OpenShift instance. This attack could potentially convince a user that the inserted text is legitimate.","modified":"2026-04-11T12:24:04.488831Z","published":"2020-09-16T18:15:12.467Z","database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:redhat:openshift:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"4.0"},{"last_affected":"4.3.5"}]}]},"references":[{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1767665"},{"type":"FIX","url":"https://github.com/openshift/origin-web-console/pull/3173"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openshift/origin","events":[{"introduced":"0"},{"last_affected":"0cbc58b117403b9d9169dbafdfac59ef104bb997"}],"database_specific":{"cpe":"cpe:2.3:a:redhat:openshift:3.11:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"3.11"}]}}],"versions":["v1.0.0","v1.0.1","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.6","v1.0.7","v1.0.8","v1.1","v1.1.1","v1.1.3","v1.1.4","v1.1.5","v1.1.6","v1.2.0-rc1","v1.2.0-rc2","v1.3.0","v1.3.0-alpha.0","v1.3.0-alpha.1","v1.3.0-alpha.3","v1.3.0-rc1","v1.4.0-alpha.0","v1.4.0-alpha.1","v1.5.0-alpha.0","v1.5.0-alpha.1","v1.5.0-alpha.2","v1.5.0-alpha.3","v3.10.0-alpha.0","v3.10.0-rc.0","v3.11.0","v3.11.0-alpha.0","v3.6.0-alpha.0","v3.6.0-alpha.1","v3.6.0-alpha.2","v3.7.0-rc.0","v3.8.0-alpha.0","v3.8.0-alpha.1","v3.9.0-alpha.0","v3.9.0-alpha.1","v3.9.0-alpha.2","v3.9.0-alpha.3","v3.9.0-alpha.4"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-10715.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}]}