2024-12-08 03:06:42 +00:00

76 lines
3.7 KiB
JSON

{
"id": "CVE-2024-34070",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-14T15:38:26.727",
"lastModified": "2024-11-21T09:18:01.680",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Froxlor is open source server administration software. Prior to 2.1.9, a Stored Blind Cross-Site Scripting (XSS) vulnerability was identified in the Failed Login Attempts Logging Feature of the Froxlor Application. An unauthenticated User can inject malicious scripts in the loginname parameter on the Login attempt, which will then be executed when viewed by the Administrator in the System Logs. By exploiting this vulnerability, the attacker can perform various malicious actions such as forcing the Administrator to execute actions without their knowledge or consent. For instance, the attacker can force the Administrator to add a new administrator controlled by the attacker, thereby giving the attacker full control over the application. This vulnerability is fixed in 2.1.9.\n"
},
{
"lang": "es",
"value": "Froxlor es un software de administraci\u00f3n de servidores de c\u00f3digo abierto. Antes de la versi\u00f3n 2.1.9, se identificaba una vulnerabilidad de Cross Site Scripting (XSS) ocultas almacenadas en la funci\u00f3n de registro de intentos de inicio de sesi\u00f3n fallidos de la aplicaci\u00f3n Froxlor. Un usuario no autenticado puede inyectar scripts maliciosos en el par\u00e1metro nombre de inicio de sesi\u00f3n en el intento de inicio de sesi\u00f3n, que luego se ejecutar\u00e1n cuando los vea el administrador en los registros del sistema. Al explotar esta vulnerabilidad, el atacante puede realizar diversas acciones maliciosas, como obligar al administrador a ejecutar acciones sin su conocimiento o consentimiento. Por ejemplo, el atacante puede obligar al administrador a agregar un nuevo administrador controlado por el atacante, d\u00e1ndole as\u00ed control total sobre la aplicaci\u00f3n. Esta vulnerabilidad se solucion\u00f3 en 2.1.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://github.com/froxlor/Froxlor/commit/a862307bce5cdfb1c208b835f3e8faddd23046e6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/froxlor/Froxlor/security/advisories/GHSA-x525-54hf-xr53",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/froxlor/Froxlor/commit/a862307bce5cdfb1c208b835f3e8faddd23046e6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/froxlor/Froxlor/security/advisories/GHSA-x525-54hf-xr53",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}