2024-12-08 03:06:42 +00:00

96 lines
3.4 KiB
JSON

{
"id": "CVE-2024-22876",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-19T14:15:13.510",
"lastModified": "2024-11-21T08:56:44.390",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "StrangeBee TheHive 5.1.0 to 5.1.9 and 5.2.0 to 5.2.8 is vulnerable to Cross Site Scripting (XSS) in the case attachment functionality which enables an attacker to upload a malicious HTML file with Javascript code that will be executed in the context of the The Hive application using a specific URL. The vulnerability can be used to coerce a victim account to perform specific actions on the application as helping an analyst becoming administrator."
},
{
"lang": "es",
"value": "StrangeBee TheHive 5.1.0 a 5.1.9 y 5.2.0 a 5.2.8 es vulnerable a Cross Site Scripting (XSS) en la funcionalidad de archivo adjunto que permite a un atacante cargar un archivo HTML malicioso con c\u00f3digo Javascript que se ejecutar\u00e1 en el contexto de la aplicaci\u00f3n The Hive utilizando una URL espec\u00edfica. La vulnerabilidad se puede utilizar para obligar a la cuenta de una v\u00edctima a realizar acciones espec\u00edficas en la aplicaci\u00f3n para ayudar a un analista a convertirse en administrador."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:strangebee:thehive:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1.0",
"versionEndIncluding": "5.1.9",
"matchCriteriaId": "A968D402-69F9-47F4-9C42-6A27FE43D5B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:strangebee:thehive:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.2.0",
"versionEndIncluding": "5.2.8",
"matchCriteriaId": "CEFF100C-9BD1-4245-AF11-077E6FB81616"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/StrangeBeeCorp/Security/blob/main/Security%20advisories/SB-SEC-ADV-2023-002.md",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/StrangeBeeCorp/Security/blob/main/Security%20advisories/SB-SEC-ADV-2023-002.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}