CVE-2024-8413

Cross Site Scripting (XSS) vulnerability through the action parameter in index.php. Affected product codebase https://github.com/Bioshox/Raspcontrol and forks such as https://github.com/harmon25/raspcontrol . An attacker could exploit this vulnerability by sending a specially crafted JavaScript payload to an authenticated user and partially hijacking their session details. References list
Configurations

Configuration 1 (hide)

cpe:2.3:a:raspcontrol_project:raspcontrol:1.0:*:*:*:*:*:*:*

History

05 Sep 2024, 17:40

Type Values Removed Values Added
CPE cpe:2.3:a:raspcontrol_project:raspcontrol:1.0:*:*:*:*:*:*:*
References () https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-raspcontrol - () https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-raspcontrol - Third Party Advisory
First Time Raspcontrol Project
Raspcontrol Project raspcontrol
Summary
  • (es) Vulnerabilidad de cross site scripting (XSS) a través del parámetro action en index.php. Código base del producto afectado https://github.com/Bioshox/Raspcontrol y bifurcaciones como https://github.com/harmon25/raspcontrol. Un atacante podría aprovechar esta vulnerabilidad enviando un payload de JavaScript especialmente manipulado a un usuario autenticado y secuestrando parcialmente los detalles de su sesión. Lista de referencias
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 6.1

04 Sep 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-04 11:15

Updated : 2024-09-05 17:40


NVD link : CVE-2024-8413

Mitre link : CVE-2024-8413

CVE.ORG link : CVE-2024-8413


JSON object : View

Products Affected

raspcontrol_project

  • raspcontrol
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')