mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 13:36:56 +00:00
60 lines
2.6 KiB
JSON
60 lines
2.6 KiB
JSON
{
|
|
"id": "CVE-2024-10481",
|
|
"sourceIdentifier": "security@huntr.dev",
|
|
"published": "2025-03-20T10:15:17.010",
|
|
"lastModified": "2025-03-20T10:15:17.010",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A CSRF vulnerability exists in comfyanonymous/comfyui versions up to v0.2.2. This vulnerability allows attackers to host malicious websites that, when visited by authenticated ComfyUI users, can perform arbitrary API requests on behalf of the user. This can be exploited to perform actions such as uploading arbitrary files via the `/upload/image` endpoint. The lack of CSRF protections on API endpoints like `/upload/image`, `/prompt`, and `/history` leaves users vulnerable to unauthorized actions, which could be combined with other vulnerabilities such as stored-XSS to further compromise user sessions."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Existe una vulnerabilidad CSRF en las versiones de comfyanonymous/comfyui hasta la v0.2.2. Esta vulnerabilidad permite a los atacantes alojar sitios web maliciosos que, al ser visitados por usuarios autenticados de ComfyUI, pueden realizar solicitudes arbitrarias a la API en nombre del usuario. Esto puede explotarse para realizar acciones como subir archivos arbitrarios a trav\u00e9s del endpoint `/upload/image`. La falta de protecci\u00f3n CSRF en endpoints de API como `/upload/image`, `/prompt` y `/history` deja a los usuarios vulnerables a acciones no autorizadas, que podr\u00edan combinarse con otras vulnerabilidades como el XSS almacenado para comprometer a\u00fan m\u00e1s las sesiones de usuario."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "security@huntr.dev",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security@huntr.dev",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-352"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://huntr.com/bounties/f4d5bfb5-6ff1-4356-b81f-f8c01d2e6ded",
|
|
"source": "security@huntr.dev"
|
|
}
|
|
]
|
|
} |