CVE-2024-26135
CVSS V2 None
CVSS V3 None
Description
MeshCentral is a full computer management web site. Versions prior to 1.1.21 a cross-site websocket hijacking (CSWSH) vulnerability within the control.ashx endpoint. This component is the primary mechanism used within MeshCentral to perform administrative actions on the server. The vulnerability is exploitable when an attacker is able to convince a victim end-user to click on a malicious link to a page hosting an attacker-controlled site. The attacker can then originate a cross-site websocket connection using client-side JavaScript code to connect to `control.ashx` as the victim user within MeshCentral. Version 1.1.21 contains a patch for this issue.
Overview
- CVE ID
- CVE-2024-26135
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-02-20T19:50:30.723Z
- Last Modified Date
- 2024-02-20T19:50:30.723Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/Ylianst/MeshCentral/security/advisories/GHSA-cp68-qrhr-g9h8 | x_refsource_CONFIRM |
https://github.com/Ylianst/MeshCentral/commit/f2e43cc6da9f5447dbff0948e6c6024c8a315af3 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-26135 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26135 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 00:46:25 | Added to TrackCVE |