CVE-2024-6427

Uncontrolled Resource Consumption vulnerability in MESbook 20221021.03 version. An unauthenticated remote attacker can use the "message" parameter to inject a payload with dangerous JavaScript code, causing the application to loop requests on itself, which could lead to resource consumption and disable the application.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mesbook:mesbook:20221021.03:*:*:*:*:*:*:*

History

21 Nov 2024, 09:49

Type Values Removed Values Added
References () https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-mesbook - Third Party Advisory () https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-mesbook - Third Party Advisory

05 Jul 2024, 17:10

Type Values Removed Values Added
CPE cpe:2.3:a:mesbook:mesbook:20221021.03:*:*:*:*:*:*:*
Summary
  • (es) Vulnerabilidad de consumo de recursos incontrolado en la versión MESbook 20221021.03. Un atacante remoto no autenticado puede usar el parámetro "mensaje" para inyectar un payload con código JavaScript peligroso, lo que hace que la aplicación realice un bucle de solicitudes sobre sí misma, lo que podría provocar el consumo de recursos y deshabilitar la aplicación.
References () https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-mesbook - () https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-mesbook - Third Party Advisory
CWE CWE-770
First Time Mesbook mesbook
Mesbook

03 Jul 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-03 12:15

Updated : 2024-11-21 09:49


NVD link : CVE-2024-6427

Mitre link : CVE-2024-6427

CVE.ORG link : CVE-2024-6427


JSON object : View

Products Affected

mesbook

  • mesbook
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-770

Allocation of Resources Without Limits or Throttling