A vulnerability was found in Stirling-Tools Stirling-PDF up to 0.28.3. It has been declared as problematic. This vulnerability affects unknown code of the component Markdown-to-PDF. The manipulation leads to cross site scripting. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 0.29.0 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains that "this functionality was removed in 0.29.0 already" and "we plan to re-add at later date with issue resolved".
References
Link | Resource |
---|---|
https://drive.google.com/file/d/1J4TnzgzKOEvMck3kpaFuR6zfSVt7YgKu/view?usp=sharing | Exploit |
https://vuldb.com/?ctiid.278242 | Permissions Required |
https://vuldb.com/?id.278242 | Third Party Advisory |
https://vuldb.com/?submit.406335 | Third Party Advisory |
Configurations
History
30 Sep 2024, 15:27
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.4 |
First Time |
Stirlingpdf
Stirlingpdf stirling Pdf |
|
CPE | cpe:2.3:a:stirlingpdf:stirling_pdf:*:*:*:*:*:*:*:* | |
References | () https://drive.google.com/file/d/1J4TnzgzKOEvMck3kpaFuR6zfSVt7YgKu/view?usp=sharing - Exploit | |
References | () https://vuldb.com/?ctiid.278242 - Permissions Required | |
References | () https://vuldb.com/?id.278242 - Third Party Advisory | |
References | () https://vuldb.com/?submit.406335 - Third Party Advisory |
26 Sep 2024, 13:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
22 Sep 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A vulnerability was found in Stirling-Tools Stirling-PDF up to 0.28.3. It has been declared as problematic. This vulnerability affects unknown code of the component Markdown-to-PDF. The manipulation leads to cross site scripting. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 0.29.0 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains that "this functionality was removed in 0.29.0 already" and "we plan to re-add at later date with issue resolved". |
21 Sep 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-21 23:15
Updated : 2024-09-30 15:27
NVD link : CVE-2024-9075
Mitre link : CVE-2024-9075
CVE.ORG link : CVE-2024-9075
JSON object : View
Products Affected
stirlingpdf
- stirling_pdf
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')