mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
60 lines
3.4 KiB
JSON
60 lines
3.4 KiB
JSON
{
|
|
"id": "CVE-2024-41663",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-07-23T16:15:06.070",
|
|
"lastModified": "2024-07-24T12:55:13.223",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Canarytokens help track activity and actions on a network. A Cross-Site Scripting vulnerability was identified in the \"Cloned Website\" Canarytoken, whereby the Canarytoken's creator can attack themselves. The creator of a slow-redirect Canarytoken can insert Javascript into the destination URL of their slow redirect token. When the creator later browses the management page for their own Canarytoken, the Javascript executes. This is a self-XSS. An attacker could create a Canarytoken with this self-XSS, and send the management link to a victim. When they click on it, the Javascript would execute. However, no sensitive information (ex. session information) will be disclosed to the malicious actor. This issue is now patched on Canarytokens.org. Users of self-hosted Canarytokens installations can update by pulling the latest Docker image, or any Docker image after `sha-097d91a`."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los Canarytokens ayudan a rastrear la actividad y las acciones en una red. Se identific\u00f3 una vulnerabilidad de Cross Site Scripting en el Canarytoken \"Cloned Website\", mediante la cual el creador del Canarytoken puede atacarse a s\u00ed mismo. El creador de un Canarytoken de redireccionamiento lento puede insertar Javascript en la URL de destino de su token de redireccionamiento lento. Cuando el creador navega m\u00e1s tarde por la p\u00e1gina de administraci\u00f3n de su propio Canarytoken, se ejecuta Javascript. Este es un XSS propio. Un atacante podr\u00eda crear un Canarytoken con este XSS propio y enviar el enlace de administraci\u00f3n a una v\u00edctima. Cuando hacen clic en \u00e9l, se ejecutar\u00e1 Javascript. Sin embargo, no se revelar\u00e1 ninguna informaci\u00f3n confidencial (por ejemplo, informaci\u00f3n de sesi\u00f3n) al actor malicioso. Este problema ya est\u00e1 solucionado en Canarytokens.org. Los usuarios de instalaciones de Canarytokens autohospedadas pueden actualizar extrayendo la \u00faltima imagen de Docker o cualquier imagen de Docker despu\u00e9s de `sha-097d91a`."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 3.5,
|
|
"baseSeverity": "LOW"
|
|
},
|
|
"exploitabilityScore": 2.1,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/thinkst/canarytokens/security/advisories/GHSA-xj9h-3j9c-c95h",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |