Apple Security Advisory 2020-12-14-9 - macOS Server 5.11 addresses a cross site scripting vulnerability.
11736756955586b31df7a72ec7f70574c4037fcc3e8502011e8b1872267b2e20
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2020-12-14-9 macOS Server 5.11
macOS Server 5.11 addresses the following issues. Information
about the security content is also available at
https://support.apple.com/HT211932.
Profile Manager
Available for: macOS Big Sur
Impact: Processing a maliciously crafted URL may lead to an open
redirect or cross site scripting
Description: An issue existed in the parsing of URLs. This issue was
addressed with improved input validation.
CVE-2020-9995: Rajpal Arora (@whacktohack), Rohan Sharma (r0hanSH)
Additional recognition
macOS Server
We would like to acknowledge Patrick Schlangen for their assistance.
Installation note:
macOS Server 5.11 may be obtained from the Mac App Store.
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAl/YBp0ACgkQZcsbuWJ6
jjDv2xAAjUAACv8tKX8uZA+7Kuq4FibiTyb/B3arSkN5SJA99T6AsThRauddvn96
RAZw2J8/BkgCLHEo+rB1DXHLoiq94IiECMCWUtSKk8fgMovEL/g+iO96+iwQBC/G
ZNBvM88bvfvoEhXfgGxAG3oclNInz0QlvY6bMhyDz4/CUfS+YlQb9ujzYV2EWfin
LBfKGOR4q8V7Hsnl6CC/4nx2TKaniKKp6hYnztftIcCDw5eJinIq8O476CyCUoaT
9UqTGUxw51Se0oc490xdufVi/7dSrmbJbiWA6KrJj58IcC6e6VU+ziByhkpX9udh
qBuFVWxynrJVgsxagYA7x/kvaEG+oDc+Otf4h6ARJOQnM/+UeizqDKbRJZjSwd2y
Efr+C92p3qM7OkQYAmBLUub1pgMLbNhlIZvb/4555Bp7s27fEuzlKniIK5406Zro
zcQ+4G3pG6rG02WAHiAV6dPvDqp+YeCdt8g4zOw7iofDulYz5rDPinfm3bKd2oes
wOnsK+JqNfmSAbSakrNKC3Ab/UHMkchji38QSScnMHdh0secKRHEcystdy4WKSVy
4ylKpkDnVnOhyYvkuMhZXSpuxKdO9bZqd1m5Usr6PR9Gf4WQTfgoyyzXP3g3u/zx
WIsYeR7e7VzR3+EGpgPKmhrbiBfL9eVkceQo1jR0Zzkw1QFsIgI=UWhb
-----END PGP SIGNATURE-----