64 lines
2.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-48396",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T21:15:04.300",
"lastModified": "2024-10-30T20:35:31.167",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AIML Chatbot 1.0 (fixed in 2.0) is vulnerable to Cross Site Scripting (XSS). The vulnerability is exploited through the message input field, where attackers can inject malicious HTML or JavaScript code. The chatbot fails to sanitize these inputs, leading to the execution of malicious scripts."
},
{
"lang": "es",
"value": "AIML Chatbot 1.0 (corregido en la versi\u00f3n 2.0) es vulnerable a Cross Site Scripting (XSS). La vulnerabilidad se explota a trav\u00e9s del campo de entrada de mensajes, donde los atacantes pueden inyectar c\u00f3digo HTML o JavaScript malicioso. El chatbot no puede desinfectar estas entradas, lo que lleva a la ejecuci\u00f3n de scripts maliciosos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/sohelamin/chatbot",
"source": "cve@mitre.org"
},
{
"url": "https://jacobmasse.medium.com/reflected-xss-in-popular-ai-chatbot-application-79de74ea0cc8",
"source": "cve@mitre.org"
}
]
}