2025-03-23 03:03:54 +00:00

60 lines
2.2 KiB
JSON

{
"id": "CVE-2024-7990",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:38.503",
"lastModified": "2025-03-20T10:15:38.503",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability exists in open-webui/open-webui version 0.3.8. The vulnerability is present in the `/api/v1/models/add` endpoint, where the model description field is improperly sanitized before being rendered in chat. This allows an attacker to inject malicious scripts that can be executed by any user, including administrators, potentially leading to arbitrary code execution."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en open-webui/open-webui versi\u00f3n 0.3.8. La vulnerabilidad est\u00e1 presente en el endpoint `/api/v1/models/add`, donde el campo de descripci\u00f3n del modelo se depura incorrectamente antes de mostrarse en el chat. Esto permite a un atacante inyectar scripts maliciosos que cualquier usuario, incluidos los administradores, puede ejecutar, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/2256e336-0f67-449e-a82d-7fc57081a21c",
"source": "security@huntr.dev"
}
]
}