{"id":"CVE-2020-15227","details":"Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework.","aliases":["GHSA-8gv3-3j7f-wg94"],"modified":"2026-04-11T12:32:16.785050Z","published":"2020-10-01T19:15:12.797Z","related":["GHSA-8gv3-3j7f-wg94"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:nette:application:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"2.0.0"},{"fixed":"2.0.19"},{"introduced":"2.1.0"},{"fixed":"2.1.13"}]},{"cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"9.0"}]}]},"references":[{"type":"ADVISORY","url":"https://github.com/nette/application/security/advisories/GHSA-8gv3-3j7f-wg94"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00003.html"},{"type":"ADVISORY","url":"https://packagist.org/packages/nette/application"},{"type":"ADVISORY","url":"https://packagist.org/packages/nette/nette"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nette/application","events":[{"introduced":"ae65689c4067539ac4b8add546e3b1f1638afb99"},{"fixed":"04d3ff7dd542795b6ca51618c63e3f54111a09e6"},{"introduced":"3c63c0318ed8510183adf09c81bdf114175e82a1"},{"fixed":"cb1ff62a74dd415092904179cd2d488ffc7215d6"},{"introduced":"b9b8166c424db14428c1cf1447dbdca673aae697"},{"fixed":"e32c04de211873c792d13d9a00c50083b8e05a23"},{"introduced":"4f3b250709226c70c8ca0a35f796877bcb72b10d"},{"fixed":"783ad6fc6444f63314175131885c04b3dd0291dd"}],"database_specific":{"cpe":"cpe:2.3:a:nette:application:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"2.2.0"},{"fixed":"2.2.10"},{"introduced":"2.3.0"},{"fixed":"2.3.14"},{"introduced":"2.4.0"},{"fixed":"2.4.16"},{"introduced":"3.0.0"},{"fixed":"3.0.6"}]}}],"versions":["v2.2.0","v2.2.1","v2.2.2","v2.2.3","v2.2.4","v2.2.5","v2.2.6","v2.2.7","v2.2.8","v2.2.9","v2.3.0","v2.3.1","v2.3.10","v2.3.11","v2.3.12","v2.3.13","v2.3.2","v2.3.3","v2.3.4","v2.3.5","v2.3.6","v2.3.7","v2.3.8","v2.3.9","v2.4.0","v2.4.1","v2.4.10","v2.4.11","v2.4.12","v2.4.13","v2.4.14","v2.4.15","v2.4.2","v2.4.3","v2.4.4","v2.4.5","v2.4.6","v2.4.7","v2.4.8","v2.4.9","v3.0.0","v3.0.1","v3.0.2","v3.0.3","v3.0.4","v3.0.5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15227.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}