mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
88 lines
3.2 KiB
JSON
88 lines
3.2 KiB
JSON
{
|
|
"id": "CVE-2024-6585",
|
|
"sourceIdentifier": "mandiant-cve@google.com",
|
|
"published": "2024-08-30T23:15:12.627",
|
|
"lastModified": "2024-09-03T15:35:16.350",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple stored cross-site scripting (\u201cXSS\u201d) vulnerabilities in the markdown dashboard and dashboard comment functionality of Lightdash version 0.1024.6 allows remote authenticated threat actors to inject malicious scripts into vulnerable web pages. A threat actor could potentially exploit this vulnerability to store malicious JavaScript which executes in the context of a user\u2019s session with the application."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Varias vulnerabilidades de cross site scripting (\u201cXSS\u201d) almacenado en el panel de control de Markdown y la funcionalidad de comentarios del panel de control de la versi\u00f3n 0.1024.6 de Lightdash permiten que actores de amenazas autenticados de forma remota inyecten secuencias de comandos maliciosas en p\u00e1ginas web vulnerables. Un actor de amenazas podr\u00eda explotar esta vulnerabilidad para almacenar c\u00f3digo JavaScript malicioso que se ejecuta en el contexto de la sesi\u00f3n de un usuario con la aplicaci\u00f3n."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.4,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.3,
|
|
"impactScore": 2.7
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "mandiant-cve@google.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/google/security-research/security/advisories/GHSA-6529-6jv3-66q2",
|
|
"source": "mandiant-cve@google.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/lightdash/lightdash",
|
|
"source": "mandiant-cve@google.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/lightdash/lightdash/pull/9359",
|
|
"source": "mandiant-cve@google.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/lightdash/lightdash/pull/9510",
|
|
"source": "mandiant-cve@google.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/lightdash/lightdash/releases/tag/0.1042.2",
|
|
"source": "mandiant-cve@google.com"
|
|
},
|
|
{
|
|
"url": "https://patch-diff.githubusercontent.com/raw/lightdash/lightdash/pull/9359.patch",
|
|
"source": "mandiant-cve@google.com"
|
|
},
|
|
{
|
|
"url": "https://patch-diff.githubusercontent.com/raw/lightdash/lightdash/pull/9510.patch",
|
|
"source": "mandiant-cve@google.com"
|
|
},
|
|
{
|
|
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6585",
|
|
"source": "mandiant-cve@google.com"
|
|
}
|
|
]
|
|
} |