2025-04-20 02:05:18 +00:00

109 lines
3.5 KiB
JSON

{
"id": "CVE-2024-8101",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:41.130",
"lastModified": "2025-04-01T20:32:35.820",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability exists in the Text Explorer component of aimhubio/aim version 3.23.0. The vulnerability arises due to the use of `dangerouslySetInnerHTML` without proper sanitization, allowing arbitrary JavaScript execution when rendering tracked texts. This can be exploited by injecting malicious HTML content during the training process, which is then rendered unsanitized in the Text Explorer."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en el componente Text Explorer de aimhubio/aim versi\u00f3n 3.23.0. Esta vulnerabilidad surge debido al uso de `dangerouslySetInnerHTML` sin la debida depuraci\u00f3n, lo que permite la ejecuci\u00f3n arbitraria de JavaScript al renderizar textos rastreados. Esto puede explotarse inyectando contenido HTML malicioso durante el proceso de entrenamiento, que posteriormente se renderiza sin depurar en Text Explorer."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:aimstack:aim:3.23.0:*:*:*:*:*:*:*",
"matchCriteriaId": "99D76F67-9F8E-413B-B64B-108170DE3764"
}
]
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/60cf2b93-a9a2-435e-a222-3d6abde26adb",
"source": "security@huntr.dev",
"tags": [
"Exploit"
]
},
{
"url": "https://huntr.com/bounties/60cf2b93-a9a2-435e-a222-3d6abde26adb",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit"
]
}
]
}