2025-03-23 03:03:54 +00:00

64 lines
2.1 KiB
JSON

{
"id": "CVE-2024-10724",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:19.390",
"lastModified": "2025-03-20T10:15:19.390",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability exists in phpipam/phpipam version 1.5.2, specifically in the Subnet NAT translations section when editing the Destination address. This vulnerability allows an attacker to execute malicious code. The issue is fixed in version 1.7.0."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en phpipam/phpipam versi\u00f3n 1.5.2, espec\u00edficamente en la secci\u00f3n de traducciones NAT de subred al editar la direcci\u00f3n de destino. Esta vulnerabilidad permite a un atacante ejecutar c\u00f3digo malicioso. El problema se ha corregido en la versi\u00f3n 1.7.0."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/phpipam/phpipam/commit/c1697bb6c4e4a6403d69c0868e1eb1040f98b731",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/0746e357-fcc7-44db-b8e7-857875c54999",
"source": "security@huntr.dev"
}
]
}