Cross Site Scripting (XSS) vulnerability through the action parameter in index.php. Affected product codebase https://github.com/Bioshox/Raspcontrol and forks such as https://github.com/harmon25/raspcontrol . An attacker could exploit this vulnerability by sending a specially crafted JavaScript payload to an authenticated user and partially hijacking their session details.
References list
References
Link | Resource |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-raspcontrol | Third Party Advisory |
Configurations
History
05 Sep 2024, 17:40
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:raspcontrol_project:raspcontrol:1.0:*:*:*:*:*:*:* | |
References | () https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-raspcontrol - Third Party Advisory | |
First Time |
Raspcontrol Project
Raspcontrol Project raspcontrol |
|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
04 Sep 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-04 11:15
Updated : 2024-09-05 17:40
NVD link : CVE-2024-8413
Mitre link : CVE-2024-8413
CVE.ORG link : CVE-2024-8413
JSON object : View
Products Affected
raspcontrol_project
- raspcontrol
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')