A stored cross-site scripting (XSS) vulnerability exists in the 'Upload Knowledge' feature of stangirard/quivr, affecting the latest version. Users can upload files via URL, which allows the insertion of malicious JavaScript payloads. These payloads are stored on the server and executed whenever any user clicks on a link containing the payload, leading to potential data theft, session hijacking, and reputation damage.
References
Link | Resource |
---|---|
https://huntr.com/bounties/2ee71e9e-2cf5-41a4-8440-d75758018786 | Exploit |
Configurations
History
11 Jul 2024, 15:03
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:quivr:quivr:*:*:*:*:*:*:*:* | |
First Time |
Quivr quivr
Quivr |
|
References | () https://huntr.com/bounties/2ee71e9e-2cf5-41a4-8440-d75758018786 - Exploit | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
08 Jul 2024, 15:49
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
07 Jul 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-07 16:15
Updated : 2024-07-11 15:03
NVD link : CVE-2024-6229
Mitre link : CVE-2024-6229
CVE.ORG link : CVE-2024-6229
JSON object : View
Products Affected
quivr
- quivr
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')