cve/2024/CVE-2024-51486.md
2025-09-29 16:08:36 +00:00

19 lines
1.1 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-51486](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51486)
![](https://img.shields.io/static/v1?label=Product&message=ampache&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%207.0.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
Ampache is a web based audio/video streaming application and file manager. The vulnerability exists in the interface section of the Ampache menu, where users can change the "Custom URL-Favicon". This section is not properly sanitized, allowing for the input of strings that can execute JavaScript. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
### POC
#### Reference
- https://github.com/ampache/ampache/security/advisories/GHSA-4xw5-f7xm-vpw5
#### Github
- https://github.com/Hacking-Notes/CVE
- https://github.com/Hacking-Notes/Hacking-Notes