mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
63 lines
3.0 KiB
JSON
63 lines
3.0 KiB
JSON
{
|
|
"id": "CVE-2024-3166",
|
|
"sourceIdentifier": "security@huntr.dev",
|
|
"published": "2024-06-06T19:16:00.817",
|
|
"lastModified": "2024-06-07T14:56:05.647",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A Cross-Site Scripting (XSS) vulnerability exists in mintplex-labs/anything-llm, affecting both the desktop application version 1.2.0 and the latest version of the web application. The vulnerability arises from the application's feature to fetch and embed content from websites into workspaces, which can be exploited to execute arbitrary JavaScript code. In the desktop application, this flaw can be escalated to Remote Code Execution (RCE) due to insecure application settings, specifically the enabling of 'nodeIntegration' and the disabling of 'contextIsolation' in Electron's webPreferences. The issue has been addressed in version 1.4.2 of the desktop application."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Existe una vulnerabilidad de Cross-site Scripting (XSS) en mintplex-labs/anything-llm, que afecta tanto a la versi\u00f3n 1.2.0 de la aplicaci\u00f3n de escritorio como a la \u00faltima versi\u00f3n de la aplicaci\u00f3n web. La vulnerabilidad surge de la funci\u00f3n de la aplicaci\u00f3n para buscar e incrustar contenido de sitios web en espacios de trabajo, que pueden explotarse para ejecutar c\u00f3digo JavaScript arbitrario. En la aplicaci\u00f3n de escritorio, esta falla se puede escalar a ejecuci\u00f3n remota de c\u00f3digo (RCE) debido a configuraciones inseguras de la aplicaci\u00f3n, espec\u00edficamente la habilitaci\u00f3n de 'nodeIntegration' y la deshabilitaci\u00f3n de 'contextIsolation' en las preferencias web de Electron. El problema se solucion\u00f3 en la versi\u00f3n 1.4.2 de la aplicaci\u00f3n de escritorio."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "security@huntr.dev",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 3.4,
|
|
"baseSeverity": "LOW"
|
|
},
|
|
"exploitabilityScore": 1.6,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security@huntr.dev",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/mintplex-labs/anything-llm/commit/fa27103d032c58904c49b92ee13fabc19a20a5ce",
|
|
"source": "security@huntr.dev"
|
|
},
|
|
{
|
|
"url": "https://huntr.com/bounties/af288bd3-8824-4216-a294-ae9fb444e5db",
|
|
"source": "security@huntr.dev"
|
|
}
|
|
]
|
|
} |