mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
134 lines
5.7 KiB
JSON
134 lines
5.7 KiB
JSON
{
|
|
"id": "CVE-2024-34697",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-05-14T15:39:27.240",
|
|
"lastModified": "2025-01-10T15:13:34.317",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "FreeScout is a free, self-hosted help desk and shared mailbox. A stored HTML Injection vulnerability has been identified in the Email Receival Module of the Freescout Application. The vulnerability allows attackers to inject malicious HTML content into emails sent to the application's mailbox. This vulnerability arises from improper handling of HTML content within incoming emails, allowing attackers to embed malicious HTML code in the context of the application's domain. Unauthenticated attackers can exploit this vulnerability to inject malicious HTML content into emails. This could lead to various attacks such as form hijacking, application defacement, or data exfiltration via CSS injection. Although unauthenticated attackers are limited to HTML injection, the consequences can still be severe. Version 1.8.139 implements strict input validation and sanitization mechanisms to ensure that any HTML content received via emails is properly sanitized to prevent malicious HTML injections."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "FreeScout es un servicio de asistencia gratuito y un buz\u00f3n de correo compartido autohospedado. Se ha identificado una vulnerabilidad de inyecci\u00f3n de HTML almacenada en el m\u00f3dulo de recepci\u00f3n de correo electr\u00f3nico de la aplicaci\u00f3n Freescout. La vulnerabilidad permite a los atacantes inyectar contenido HTML malicioso en los correos electr\u00f3nicos enviados al buz\u00f3n de la aplicaci\u00f3n. Esta vulnerabilidad surge del manejo inadecuado del contenido HTML en los correos electr\u00f3nicos entrantes, lo que permite a los atacantes incrustar c\u00f3digo HTML malicioso en el contexto del dominio de la aplicaci\u00f3n. Los atacantes no autenticados pueden aprovechar esta vulnerabilidad para inyectar contenido HTML malicioso en los correos electr\u00f3nicos. Esto podr\u00eda dar lugar a diversos ataques, como secuestro de formularios, destrucci\u00f3n de aplicaciones o filtraci\u00f3n de datos mediante inyecci\u00f3n de CSS. Aunque los atacantes no autenticados se limitan a la inyecci\u00f3n de HTML, las consecuencias a\u00fan pueden ser graves. La versi\u00f3n 1.8.139 implementa mecanismos estrictos de validaci\u00f3n y sanitizaci\u00f3n de entradas para garantizar que cualquier contenido HTML recibido a trav\u00e9s de correos electr\u00f3nicos se desinfecte adecuadamente para evitar inyecciones HTML maliciosas."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
|
|
"baseScore": 7.6,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "LOW"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 4.7
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"baseScore": 6.1,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 2.7
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-74"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.8.139",
|
|
"matchCriteriaId": "36F4D0DA-CB9B-441B-B2AA-0115316837EF"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/freescout-helpdesk/freescout/commit/99a4b4b4e153c82e273e549b9efbf6db4a2d8328",
|
|
"source": "security-advisories@github.com",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/freescout-helpdesk/freescout/security/advisories/GHSA-985r-6qfc-hg8m",
|
|
"source": "security-advisories@github.com",
|
|
"tags": [
|
|
"Exploit",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/freescout-helpdesk/freescout/commit/99a4b4b4e153c82e273e549b9efbf6db4a2d8328",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/freescout-helpdesk/freescout/security/advisories/GHSA-985r-6qfc-hg8m",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |