CVE-2024-43396

Khoj is an application that creates personal AI agents. The Automation feature allows a user to insert arbitrary HTML inside the task instructions, resulting in a Stored XSS. The q parameter for the /api/automation endpoint does not get correctly sanitized when rendered on the page, resulting in the ability of users to inject arbitrary HTML/JS. This vulnerability is fixed in 1.15.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:khoj:khoj:*:*:*:*:*:*:*:*

History

03 Sep 2024, 18:19

Type Values Removed Values Added
References () https://github.com/khoj-ai/khoj/commit/1c7a562880eeb7354325545d2cf6c5d1d1134812 - () https://github.com/khoj-ai/khoj/commit/1c7a562880eeb7354325545d2cf6c5d1d1134812 - Patch
References () https://github.com/khoj-ai/khoj/commit/55be90cdd2f9d6a09c8bf9ceea52fc36b9201626 - () https://github.com/khoj-ai/khoj/commit/55be90cdd2f9d6a09c8bf9ceea52fc36b9201626 - Patch
References () https://github.com/khoj-ai/khoj/security/advisories/GHSA-cf72-vg59-4j4h - () https://github.com/khoj-ai/khoj/security/advisories/GHSA-cf72-vg59-4j4h - Exploit, Vendor Advisory
CPE cpe:2.3:a:khoj:khoj:*:*:*:*:*:*:*:*
First Time Khoj
Khoj khoj

21 Aug 2024, 12:30

Type Values Removed Values Added
Summary
  • (es) Khoj es una aplicación que crea agentes personales de IA. La función de Automatización permite al usuario insertar HTML arbitrario dentro de las instrucciones de la tarea, lo que da como resultado un XSS almacenado. El parámetro q para el endpoint /api/automation no se desinfecta correctamente cuando se representa en la página, lo que da como resultado la capacidad de los usuarios de inyectar HTML/JS arbitrario. Esta vulnerabilidad se solucionó en 1.15.0.

20 Aug 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-20 21:15

Updated : 2024-09-03 18:19


NVD link : CVE-2024-43396

Mitre link : CVE-2024-43396

CVE.ORG link : CVE-2024-43396


JSON object : View

Products Affected

khoj

  • khoj
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')