mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
78 lines
2.6 KiB
JSON
78 lines
2.6 KiB
JSON
{
|
|
"id": "CVE-2024-37392",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-08-23T21:15:07.253",
|
|
"lastModified": "2025-01-09T18:15:27.790",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A stored Cross-Site Scripting (XSS) vulnerability has been identified in SMSEagle software version < 6.0. The vulnerability arises because the application did not properly sanitize user input in the SMS messages in the inbox. This could allow an attacker to inject malicious JavaScript code into an SMS message, which gets executed when the SMS is viewed and specially interacted in web-GUI."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se ha identificado una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la versi\u00f3n del software SMSEagle < 6.0. La vulnerabilidad surge porque la aplicaci\u00f3n no desinfect\u00f3 adecuadamente la entrada del usuario en los mensajes SMS en la bandeja de entrada. Esto podr\u00eda permitir a un atacante inyectar c\u00f3digo JavaScript malicioso en un mensaje SMS, que se ejecuta cuando el SMS se ve y se interact\u00faa especialmente en la GUI web."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"baseScore": 6.1,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 2.7
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:smseagle:smseagle:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "6.0",
|
|
"matchCriteriaId": "81C8A1F4-B480-4AC9-93F1-047DE326D2AF"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.smseagle.eu/security-advisory/resolved-xss-in-smseagle-software-cve-2024-37392/",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |