2025-03-02 03:03:52 +00:00

156 lines
8.2 KiB
JSON

{
"id": "CVE-2024-45803",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-17T19:15:28.660",
"lastModified": "2024-10-07T17:05:16.440",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Wire UI is a library of components and resources to empower Laravel and Livewire application development. A potential Cross-Site Scripting (XSS) vulnerability has been identified in the `/wireui/button` endpoint, specifically through the `label` query parameter. Malicious actors could exploit this vulnerability by injecting JavaScript into the `label` parameter, leading to the execution of arbitrary code in the victim's browser. The `/wireui/button` endpoint dynamically renders button labels based on user-provided input via the `label` query parameter. Due to insufficient sanitization or escaping of this input, an attacker can inject malicious JavaScript. By crafting such a request, an attacker can inject arbitrary code that will be executed by the browser when the endpoint is accessed. If exploited, this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the affected website. This could lead to: **Session Hijacking**: Stealing session cookies, tokens, or other sensitive information. **User Impersonation**: Performing unauthorized actions on behalf of authenticated users. **Phishing**: Redirecting users to malicious websites. **Content Manipulation**: Altering the appearance or behavior of the affected page to mislead users or execute further attacks. The severity of this vulnerability depends on the context of where the affected component is used, but in all cases, it poses a significant risk to user security. This issue has been addressed in release versions 1.19.3 and 2.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Wire UI es una librer\u00eda de componentes y recursos para potenciar el desarrollo de aplicaciones Laravel y Livewire. Se ha identificado una posible vulnerabilidad de Cross-Site Scripting (XSS) en el endpoint `/wireui/button`, espec\u00edficamente a trav\u00e9s del par\u00e1metro de consulta `label`. Los actores maliciosos podr\u00edan explotar esta vulnerabilidad inyectando JavaScript en el par\u00e1metro `label`, lo que lleva a la ejecuci\u00f3n de c\u00f3digo arbitrario en el navegador de la v\u00edctima. El endpoint `/wireui/button` representa din\u00e1micamente las etiquetas de los botones en funci\u00f3n de la entrada proporcionada por el usuario a trav\u00e9s del par\u00e1metro de consulta `label`. Debido a la desinfecci\u00f3n o el escape insuficiente de esta entrada, un atacante puede inyectar JavaScript malicioso. Al crear una solicitud de este tipo, un atacante puede inyectar c\u00f3digo arbitrario que ser\u00e1 ejecutado por el navegador cuando se acceda al endpoint. Si se explota, esta vulnerabilidad podr\u00eda permitir a un atacante ejecutar c\u00f3digo JavaScript arbitrario en el contexto del sitio web afectado. Esto podr\u00eda conducir a: **Secuestro de sesi\u00f3n**: Robo de cookies de sesi\u00f3n, tokens u otra informaci\u00f3n confidencial. **Suplantaci\u00f3n de identidad de usuario**: realizar acciones no autorizadas en nombre de usuarios autenticados. **Phishing**: redireccionar a los usuarios a sitios web maliciosos. **Manipulaci\u00f3n de contenido**: alterar la apariencia o el comportamiento de la p\u00e1gina afectada para enga\u00f1ar a los usuarios o ejecutar m\u00e1s ataques. La gravedad de esta vulnerabilidad depende del contexto en el que se utiliza el componente afectado, pero en todos los casos supone un riesgo importante para la seguridad del usuario. Este problema se ha solucionado en las versiones 1.19.3 y 2.1.3. Se recomienda a los usuarios que actualicen la versi\u00f3n. No existen workarounds para esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireui:wireui:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.19.3",
"matchCriteriaId": "7DEE3DD0-06D9-4A6C-BBEE-F768B792218E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireui:wireui:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.1.3",
"matchCriteriaId": "16A1EB39-E561-48AB-B053-2FB05D3EF9D7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wireui/wireui/commit/784c4f110e58eb41d0f2bdecd4655ea417f16e7e",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/wireui/wireui/commit/a457654912055f4dcc559da04d4e319f76b80fc5",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/wireui/wireui/security/advisories/GHSA-rw5h-g8xq-6877",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}