64 lines
2.7 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-45031",
"sourceIdentifier": "security@apache.org",
"published": "2024-10-24T15:15:13.533",
"lastModified": "2024-11-25T22:15:12.147",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When editing objects in the Syncope Console, incomplete HTML tags could be used to bypass HTML sanitization. This made it possible to inject stored XSS payloads which would trigger for other users during ordinary usage of the application.\nXSS payloads could also be injected in Syncope Enduser when editing \u201cPersonal Information\u201d or \u201cUser Requests\u201d: such payloads would trigger for administrators in Syncope Console, thus enabling session hijacking.\n\nUsers are recommended to upgrade to version 3.0.9, which fixes this issue."
},
{
"lang": "es",
"value": "Al editar objetos en Syncope Console, se pod\u00edan usar etiquetas HTML incompletas para evitar la desinfecci\u00f3n de HTML. Esto hac\u00eda posible inyectar payloads XSS almacenados que se activaban para otros usuarios durante el uso normal de la aplicaci\u00f3n. Los payloads XSS tambi\u00e9n se pod\u00edan inyectar en Syncope Enduser al editar \u201cInformaci\u00f3n personal\u201d o \u201cSolicitudes de usuario\u201d: dichos payloads se activaban para los administradores en Syncope Console, lo que permit\u00eda el secuestro de sesiones. Se recomienda a los usuarios que actualicen a la versi\u00f3n 3.0.9, que soluciona este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/fn567pfmo3s55ofkc42drz8b4kgbhp9m",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/10/24/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}